Academic literature on the topic 'RSA Digital Signature'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'RSA Digital Signature.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "RSA Digital Signature"

1

Nuraeni, Fitri, Dede Kurniadi, and Diva Nuratnika Rahayu. "IMPLEMENTATION OF RSA AND AES-128 SUPER ENCRYPTION ON QR-CODE BASED DIGITAL SIGNATURE SCHEMES FOR DOCUMENT LEGALIZATION." Jurnal Teknik Informatika (Jutif) 5, no. 3 (2024): 675–84. https://doi.org/10.52436/1.jutif.2024.5.3.1426.

Full text
Abstract:
Maintaining the confidentiality and integrity of electronic documents is essential in the modern digital age. In the contemporary digital world, digital signatures are essential for safeguarding and legalizing electronic documents. The current issue, however, goes beyond digital signatures and instead centers on enhancing security and data integrity. Therefore, RSA and AES-128 super-encryption is required in QR-code-based digital signature techniques for document legalization. This research stage entails constructing a super encryption algorithm, testing it experimentally for security and perf
APA, Harvard, Vancouver, ISO, and other styles
2

HS, Christnatalis, and Amir Mahmud Husein. "Digital Signs Security System using AES-Blowfish-RSA Hybrid Cryptography Approach." SinkrOn 4, no. 1 (2019): 185. http://dx.doi.org/10.33395/sinkron.v4i1.10244.

Full text
Abstract:
Increasing application of digital signatures in legitimate authentication of administrative documents in both public and private environments is one of the points of concern, especially the issue of security and integrity of ownership of signatures. Digital signature is a mathematical scheme, which a unit to identify and prove the authenticity of the owner of the message or document. The study aims to analyze security patterns and identification of digital signatures on documents using the RSA-AES-Blowfish hybrid cryptographic method approach for securing digital signatures, while the Kohonen
APA, Harvard, Vancouver, ISO, and other styles
3

Wei, Yan Na, Y. T. Jin, and J. W. Zhou. "Design and Realization of RSA Digital Signature System Based on Digital Certificate." Applied Mechanics and Materials 743 (March 2015): 698–701. http://dx.doi.org/10.4028/www.scientific.net/amm.743.698.

Full text
Abstract:
Digital signature plays a more and more important role in e-commerce. The basic methods of digital signature are introduced and a digital signature scheme based on digital certificate is proposed in this paper. Digital certificate is generated after personal information is written. The effective data, RSA parameters and signature results are included in digital certificate. The related RSA parameters of private key certificate are encrypted by private key password. The digital digest is gotten through hash algorithm in this scheme. Digital signature is operated by using RSA parameters in priva
APA, Harvard, Vancouver, ISO, and other styles
4

MUSTAFA, HUSSEIN, ELHADY MAHMOUD ABD, HAMDY SARA, and ALSOBKY WAGEDA. "DESIGNING NEW TECHNIQUE IN DIGITAL SIGNATURE BASED ON GALOIS FIELD 2n AND CHAOTIC MAPS." Seybold Report Journal 18, no. 09 (2023): 53–72. https://doi.org/10.5281/zenodo.8344314.

Full text
Abstract:
Abstract Ensuring the utmost security, confidentiality, and integrity of digital communications has become an imperative requirement in today's world. This realization highlights the significance of employing Digital Signature Algorithms (DSA) in various online applications. DSA's true value lies in its ability to deliver secure digital signatures, assuring the verification of digital documents, messages, or transactions. This aspect holds paramount importance in critical domains such as online banking, e-commerce, digital contracts, and government services where safeguarding sensitive
APA, Harvard, Vancouver, ISO, and other styles
5

Chubaievskyi, Vitalii, Nataliia Lutska, Tetyana Savchenko, Lidiia Vlasenko, and Kyrylo Synelnyk. "ENHANCED CRYPTOGRAPHIC SECURITY OF AGGREGATED DIGITAL SIGNATURES THROUGH UTILIZATION OF A UNIFIED AUTHENTICATION FRAMEWORK." Cybersecurity: Education, Science, Technique 2, no. 22 (2023): 39–53. http://dx.doi.org/10.28925/2663-4023.2023.22.3953.

Full text
Abstract:
The significance of this research lies in safeguarding user information and data against unauthorized alterations and destruction. Throughout the study, key aspects were explored, including user identification and authen-tication methods, cryptographic authentication protocols, digital signature properties, and strategies to enhance the cryptographic robustness of digital signatures. These strategies involved scrutinizing authentication methods using the Saati technique and the RSA algorithm. The analysis revealed that the attributes employed for digital signature recognition are highly resist
APA, Harvard, Vancouver, ISO, and other styles
6

Xu, Jingkun. "A Comprehensive Study of Digital Signatures: Algorithms, Challenges and Future Prospects." ITM Web of Conferences 73 (2025): 03009. https://doi.org/10.1051/itmconf/20257303009.

Full text
Abstract:
This article examines digital signature as a critical security measure for authentication and verification in electronic transactions, distinguishing them from simpler e-signatures by their use of advanced cryptographic techniques. Digital signature leverage asymmetric cryptography to provide higher security, with various standardised algorithms, such as the Digital Signature Algorithm (DSA) and Rivest- Shamir-Adleman (RSA), forming the foundation of secure systems today. The paper outlines the evolution of digital and electronic signature, from early telegraph-based approvals to the modern ap
APA, Harvard, Vancouver, ISO, and other styles
7

Ihwani, Mohamad. "INFORMATION SECURITY MODEL BASED DIGITAL SIGNATURE ALGORITHM WITH RSA ALGORITHM." Computer Engineering, Science and System Journal 1, no. 1 (2016): 15–20. http://dx.doi.org/10.24114/cess.v1i1.4037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lyu, Shuhan. "Advances in Digital Signature Algorithms: Performance, Security and Future Prospects." ITM Web of Conferences 73 (2025): 03010. https://doi.org/10.1051/itmconf/20257303010.

Full text
Abstract:
With the rise of online transactions and digital communications, digital signatures have become essential for verifying document integrity and authenticity across fields like finance, government, and healthcare. This article examines several important digital signature algorithms, analyzing their principles and performance. Each algorithm offers unique advantages: the Rivest – Shamir – Adleman (RSA) provides security through integer factorization, the Digital Signature Algorithm (DSA) through discrete logarithms, and the Elliptic Curve Digital Signature Algorithm (ECDSA) with the efficient ell
APA, Harvard, Vancouver, ISO, and other styles
9

Harta, I. Gede Bendesa Aria, I. Ketut Gede Suhartana, I. Gusti Ngurah Anom Cahyadi, Cokorda Pramartha, I. Komang Ari Mogi, and Made Agung Raharja. "Pengamanan Lontar Digital Dengan Tanda Tangan Digital Menggunakan Algoritma RSA." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 10, no. 2 (2022): 199. http://dx.doi.org/10.24843/jlk.2021.v10.i02.p02.

Full text
Abstract:
Lontar is a relic of cultural heritage whose basic source of manufacture is from rontal or tal leaves containing evidence of all records of aspects of ancient historical life which include historical values, religion, philosophy, medicine, literature and other sciences so that their sustainability needs to be maintained.
 Security of digital lontar will make it easier to preserve a lontar work so that it is not changed or falsified by irresponsible parties, where digital lontar in PDF format will be given a digital signature to maintain the authenticity of the document. Documents that are
APA, Harvard, Vancouver, ISO, and other styles
10

Prabowo, Egi Cahyo, and Irawan Afrianto. "PENERAPAN DIGITAL SIGNATURE DAN KRIPTOGRAFI PADA OTENTIKASI SERTIFIKAT TANAH DIGITAL." Komputa : Jurnal Ilmiah Komputer dan Informatika 6, no. 2 (2017): 83–90. http://dx.doi.org/10.34010/komputa.v6i2.2481.

Full text
Abstract:
Digital signature merupakan suatu teknologi digital yang dapat disipkan pada suatu dokumen untuk menjaga otentifikasinya. Peneltian ini tertujuan menerapkan digital signature untuk menguji keutuhan dan otentikasi dokumen sertifikat tanah digital, serta dapat mendeteksi perubahan dokumen sertifikat tanah digital dari hasil manipulasi oleh orang yang tidak berhak. Salah satu cara untuk melakukan digital signature pada dokumen sertifikat tanah digital yaitu dengan menggunakan fungsi hash. Algoritma hash yang digunakan dalam penelitian adalah Secure Hash Algorithm-256 (SHA-256), sedangkan algoritm
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "RSA Digital Signature"

1

Seyed, Saboonchi Nima. "Hardware Security Module Performance Optimization by Using a "Key Pool" : Generating keys when the load is low and saving in the external storage to use when the load is high." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-158122.

Full text
Abstract:
This thesis project examines the performance limitations of Hardware Security Module (HSM) devices with respect to fulfilling the needs of security services in a rapidly growing security market in a cost-effective way. In particular, the needs due to the introduction of a new electronic ID system in Sweden (the Federation of Swedish eID) and how signatures are created and managed. SafeNet Luna SA 1700 is a high performance HSM's available in the current market. In this thesis the Luna SA 1700 capabilities are stated and a comprehensive analysis of its performance shows a performance gap betwee
APA, Harvard, Vancouver, ISO, and other styles
2

Magri, Bernardo Caraponale. "Assinatura digital Rabin-Williams - sem randomização e com prova eficiente de segurança." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-10092012-165253/.

Full text
Abstract:
Com o surgimento da criptografia de chave pública, muito esforço foi feito para a criação de protocolos de criptografia e de assinatura que fossem comprovadamente seguros contra indivíduos maliciosos. Existem várias definições de segurança, tanto para protocolos de criptografia como para protocolos de assinatura, e também existem vários modelos de adversários, que simulam um indivíduo malicioso tentando corromper o protocolo. A família de protocolos de assinatura Rabin possui os recordes de velocidade de vericação da assinatura, chegando a ser até 100 vezes mais rápida do que o RSA. Este traba
APA, Harvard, Vancouver, ISO, and other styles
3

Koshta, Prashant Kumar, and Shailendra Singh Thakur. "A Novel Authenticity of an Image Using Visual Cryptography." IJCSN, 2012. http://hdl.handle.net/10150/219514.

Full text
Abstract:
Information security in the present era is becoming very important in communication and data storage. Data transferred from one party to another over an insecure channel (e.g., Internet) can be protected by cryptography. The encrypting technologies of traditional and modern cryptography are usually used to avoid the message from being disclosed. Public-key cryptography usually uses complex mathematical computations to scramble the message.<br>A digital signature is an important public-key primitive that performs the function of conventional handwritten signatures for entity authentic
APA, Harvard, Vancouver, ISO, and other styles
4

Valkaitis, Mindaugas. "Efektyvios šifravimo bei skaitmeninio parašo sistemos." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20140704_171717-30545.

Full text
Abstract:
Šio darbo tikslas – apžvelgti šiuo metu naudojamas klasikines viešojo rakto šifravimo ir skaitmeninio parašo sistemas bei naujos kartos Signcryption kriptosistemą ir atlikti dedikuotos pasirašymo ir šifravimo kriptosistemos efektyvumo palyginimą su pasirašymo arba šifravimo kriptosistemų kompozicija bei pasiūlyti praktinio pritaikymą naujos kartos Signcryption kriptosistemai. Darbe apžvelgtos šios kriptosistemos: 1. RSA (Rivest, Shamir, Adleman) – klasikinė viešojo rakto pasirašymo arba šifravimo kriptosistema, kurios saugumas paremtas didelių skaičių faktorizacijos uždavinio sprendimo sudėtin
APA, Harvard, Vancouver, ISO, and other styles
5

Balaževič, Lukáš. "Mechanismy zabezpečení OS Android s využitím jazyka Kotlin." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413001.

Full text
Abstract:
Mobilné zariadenia sú v rámci technologickej histórie novinka a pri technológii, ktorá sa vyvíja tak rapídnym tempom a rastom používania je nutné dbať na zabezpečenie. Táto diplomová práca sa zaoberá rozborom bezpečnostných mechanizmov používaných v Android OS a komunikáciou medzi OS Android a vzdialeným serverom. Cieľom je preskúmať tieto mechanizmy a otestovať aké kryptografické metódy a postupy je najvýhodnejšie používať z hľadiska bezpečnosti s ohľadom na efektivitu. Tieto znalosti boli použité pre vytvorenie demonštračného systému, ktorý využíva vybrané zabezpečovacie mechanizmy a kryptog
APA, Harvard, Vancouver, ISO, and other styles
6

Krisell, Martin. "Elliptic Curve Digital Signatures in RSA Hardware." Thesis, Linköpings universitet, Informationskodning, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-81084.

Full text
Abstract:
A digital signature is the electronic counterpart to the hand written signature. It can prove the source and integrity of any digital data, and is a tool that is becoming increasingly important as more and more information is handled electronically. Digital signature schemes use a pair of keys. One key is secret and allows the owner to sign some data, and the other is public and allows anyone to verify the signature. Assuming that the keys are large enough, and that a secure scheme is used, it is impossible to find the private key given only the public key. Since a signature is valid for the s
APA, Harvard, Vancouver, ISO, and other styles
7

Vychodil, Petr. "Softwarová podpora výuky kryptosystémů založených na problému faktorizace velkých čísel." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218146.

Full text
Abstract:
This thesis deals with new teaching software, which supports asymmetric encryption algorithms based on the issue of large numbers´ factorization. A model program was created. It allows to carry out operations related to encryption and decryption with an interactive control. There is a simple way to understand the principle of the RSA encryption method with its help. The encryption of algorithms is generally analysed in chapters 1,2. Chapters 3 and 4 deals with RSA encryption algorithm in much more details, and it also describes the principles of the acquisition, management and usage of encrypt
APA, Harvard, Vancouver, ISO, and other styles
8

Хома, Любава Віталіївна. "Дослiдження криптографiчних протоколiв електронного голосування". Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2021. https://ela.kpi.ua/handle/123456789/44250.

Full text
Abstract:
Робота обсягом 45 сторiнок мiстить 4 рисунки, 12 таблиць та 15 лiтературних посилань. Метою роботи є огляд iснуючих систем електронного голосування, а також порiвняння їх можливостей та критерiїв, яким вiдповiдає повнiстю, яким частково. Вибiр системи електронного голосування, для якої планується виконати модифiкацiю. Об’єктом дослiдження в данiй роботi є системи електронного голосування i криптографiчний протоколи електронного голосування. Предметом дослiдження є математичнi моделi i характеристики алгоритмiв протоколiв електронного голосування. Виконано огляд до рiзних систем електро
APA, Harvard, Vancouver, ISO, and other styles
9

Hiromasa, Ryo. "Efficient Fully Homomorphic Encryption and Digital Signatures Secure from Standard Assumptions." 京都大学 (Kyoto University), 2017. http://hdl.handle.net/2433/225736.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pavel, Lukáš. "Elektronický geocaching." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220639.

Full text
Abstract:
The goal is to design and implement a concept of electronic geocaching with contactless smart card and cell phone with NFC interface. In the first chapter I describe geocaching and try to familiarize the reader with this game. The second chapter deals with the issue of smart cards, I describe here the contact and contactless cards and their security. In the third chapter, I describe use and security of radio communication interface NFC. In the fourth chapter, I describe the principles of symmetric and asymmetric cryptography and selected cryptographic techniques. In the fifth chapter is descri
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "RSA Digital Signature"

1

Martin, Keith M. Digital Signature Schemes. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0007.

Full text
Abstract:
In this chapter, we discuss digital signature schemes. We start by considering the general requirements of a digital signature scheme. We show first that a digital signature scheme could be established using symmetric techniques. We then consider the more conventional use of public-key cryptography to create digital signature schemes. We compare two different approaches to building a digital signature scheme and illustrate how to manifest these using RSA. We then discuss practical issues concerning digital signature schemes, including different aspects of their security. We close by providing
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "RSA Digital Signature"

1

Kaliski, Burt. "RSA Digital Signature Scheme." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_432.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kaliski, Burt. "RSA Digital Signature Scheme." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_432.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Katz, Jonathan. "Signature Schemes Based on the (Strong) RSA Assumption." In Digital Signatures. Springer US, 2010. http://dx.doi.org/10.1007/978-0-387-27712-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bas, Esra. "RSA public key cryptosystem, RSA digital signature algorithm, and integer factorization." In Public Key Cryptosystems. CRC Press, 2024. http://dx.doi.org/10.1201/9781003514190-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Alcalá, Fernando Contreras, Miguel Ángel González de la Torre, and Luis Hernández Encinas. "Fault Injection Attacks Against RSA-CRT Digital Signature." In Springer Proceedings in Mathematics & Statistics. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-84151-4_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hofheinz, Dennis, and Eike Kiltz. "Scalable Cryptography." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-21534-6_9.

Full text
Abstract:
AbstractIn our modern digital society, cryptography is vital to protect the secrecy and integrity of transmitted and stored information. Settings like digital commerce, electronic banking, or simply private email communication already rely on encryption and signature schemes.However, today’s cryptographic schemes do not scale well, and thus are not suited for the increasingly large sets of data they are used on. For instance, the security guarantees currently known for RSA encryption—one of the most commonly used type of public-key encryption scheme—degrade linearly in the number of users and ciphertexts. Hence, larger settings (such as cloud computing, or simply the scenario of encrypting all existing email traffic) may enable new and more efficient attacks. To maintain a reasonable level of security in larger scenarios, RSA keylengths must be chosen significantly larger, and the scheme becomes very inefficient. Besides, a switch in RSA keylengths requires an update of the whole public key infrastructure, an impossibility in truly large scenarios. Even worse, when the scenario grows beyond an initially anticipated size, we may lose all security guarantees.This problematic is the motivation for our project “Scalable Cryptography”, which aims at offering a toolbox of cryptographic schemes that are suitable for huge sets of data. In this overview, we summarize the approach, and the main findings of our project. We give a number of settings in which it is possible to indeed provide scalable cryptographic building blocks. For instance, we survey our work on the construction of scalable public-key encryption schemes (a central cryptographic building block that helps secure communication), but also briefly mention other settings such as “reconfigurable cryptography”. We also provide first results on scalable quantum-resistant cryptography, i.e., scalable cryptographic schemes that remain secure even in the presence of a quantum computer.
APA, Harvard, Vancouver, ISO, and other styles
7

Bakhtina, Mariia, Jan Kvapil, Petr Švenda, and Raimundas Matulevičius. "The Power of Many: Securing Organisational Identity Through Distributed Key Management." In Advanced Information Systems Engineering. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-61057-8_28.

Full text
Abstract:
AbstractOrganisational Digital Identity (ODI) often relies on the credentials and keys being controlled by a single person-representative. Moreover, some Information Systems (IS) outsource the key management to a third-party controller. Both the centralisation and outsourcing of the keys threaten data integrity within the IS, allegedly provided by a trusted organisation. Also, outsourcing the control prevents an organisation from cryptographically enforcing custom policies, e.g. time-based, regarding the data originating from it. To address this, we propose a Distributed Key Management System (DKMS) that eliminates the risks associated with centralised control over an organisation’s identity and allows organisation-enforceable policies. The DKMS employs threshold signatures to directly involve multiple organisation’s representatives (e.g. employees, IS components, and external custodians) in data signing on its behalf. The threshold signature creation and, therefore, the custom signing policy inclusion, is fully backwards compatible with commonly used signing schemes, such as RSA or ECDSA. The feasibility of the proposed system is shown in an example data exchange system, X-Road. The implementation confirms the ability of the design to achieve distributed control over the ODI during the operational key phase. Excluding a network delay, the implementation introduces less than 200 ms overhead compared to the built-in signing solution.
APA, Harvard, Vancouver, ISO, and other styles
8

Manz, Olaf. "Der Weg zur RSA-Signatur." In Digitale Signatur. Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-662-68417-7_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Welschenbach, Michael. "Ein Anwendungsbeispiel: Digitale RSA-Signaturen." In Kryptographie in C und C++. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/978-3-642-97997-2_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Patarin, Jacques, Nicolas Courtois, and Louis Goubin. "QUARTZ, 128-Bit Long Digital Signatures." In Topics in Cryptology — CT-RSA 2001. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45353-9_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "RSA Digital Signature"

1

Chaudhary, Sumit, Vineeta Singh, Neeru Malik, Kawerinder Singh Sidhu, Madhu Kirola, and Kapil Joshi. "Digital Signature Security Enhancement: Using X-OR Operation on RSA and AES with 4096 Bits Key Length." In 2024 International Conference on Computing, Sciences and Communications (ICCSC). IEEE, 2024. https://doi.org/10.1109/iccsc62048.2024.10830431.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vijjapu, Aditya, Anusha P. Alagawadi, Anish Maddi, and C. R. Kavitha. "Enhancing Medical Record Security: Using Role-based Access Control, Digital Signatures, and RSA Encryption." In 2024 8th International Conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2024. https://doi.org/10.1109/iceca63461.2024.10800884.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Chunfu, Jing Bai, Yanchun Liang, Adriano Tavares, Lidong Wang, and Jie Jiang. "A Digital Currency Scheme Based on Blind Signatures Using Chaotic Hash Functions and RSA Algorithm." In 2024 5th International Conference on Information Science, Parallel and Distributed Systems (ISPDS). IEEE, 2024. http://dx.doi.org/10.1109/ispds62779.2024.10667575.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ping, Zhao Li, Shu Qi Liang, and Lai Xiao Liang. "RSA Encryption and Digital Signature." In 2011 International Conference on Computational and Information Sciences (ICCIS). IEEE, 2011. http://dx.doi.org/10.1109/iccis.2011.245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Amaral, Luiz Fernando Ribeiro, Jorge Guilherme Silva dos Santos, Mateus Almeida Rocha, et al. "Authentication of Identity Documents Using DNSSEC, Digital Signatures and QR Codes." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/sbseg.2017.19512.

Full text
Abstract:
This paper describes a system for authenticating identity documents by digitally signing the data and embedding it in a 2D code to be printed with the document. In the proposed scheme, a message is digitally signed using a digital signature block which is stored in a QR Code. The code is later scanned by the user and, after validation, the corresponding digital information can be compared with the printed information. The authenticity of the message is guaranteed using RSA digital signatures and a secure DNS implementation based on DANE and DNSSEC for the certificate distribution. A proof of c
APA, Harvard, Vancouver, ISO, and other styles
6

Toradmalle, Dhanashree, Rohan Singh, Het Shastri, Nikita Naik, and Vishal Panchidi. "Prominence Of ECDSA Over RSA Digital Signature Algorithm." In 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE, 2018. http://dx.doi.org/10.1109/i-smac.2018.8653689.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cao, Ying-yu, and Chong Fu. "An Efficient Implementation of RSA Digital Signature Algorithm." In 2008 International Conference on Intelligent Computation Technology and Automation (ICICTA). IEEE, 2008. http://dx.doi.org/10.1109/icicta.2008.398.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fu, Chong, and Zhi-Liang Zhu. "An Efficient Implementation of RSA Digital Signature Algorithm." In 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2008. http://dx.doi.org/10.1109/wicom.2008.2914.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lin, Iuon-Chang, and Hsing-Lei Wang. "An Improved Digital Signature Scheme with Fault Tolerance in RSA." In 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2010. http://dx.doi.org/10.1109/iihmsp.2010.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Madhusudhana Reddy, E., K. Suresh Kumar Reddy, and M. Padmavathamma. "An e-commerce security solution using MJ2-RSA Digital Signature." In 2011 IEEE Recent Advances in Intelligent Computational Systems (RAICS). IEEE, 2011. http://dx.doi.org/10.1109/raics.2011.6069343.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "RSA Digital Signature"

1

Sury, O. Use of the SHA-256 Algorithm with RSA, Digital Signature Algorithm (DSA), and Elliptic Curve DSA (ECDSA) in SSHFP Resource Records. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6594.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Allende López, Marcos, Diego López, Sergio Cerón, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003313.

Full text
Abstract:
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!