Journal articles on the topic 'RSA Digital Signature'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'RSA Digital Signature.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Nuraeni, Fitri, Dede Kurniadi, and Diva Nuratnika Rahayu. "IMPLEMENTATION OF RSA AND AES-128 SUPER ENCRYPTION ON QR-CODE BASED DIGITAL SIGNATURE SCHEMES FOR DOCUMENT LEGALIZATION." Jurnal Teknik Informatika (Jutif) 5, no. 3 (2024): 675–84. https://doi.org/10.52436/1.jutif.2024.5.3.1426.
Full textHS, Christnatalis, and Amir Mahmud Husein. "Digital Signs Security System using AES-Blowfish-RSA Hybrid Cryptography Approach." SinkrOn 4, no. 1 (2019): 185. http://dx.doi.org/10.33395/sinkron.v4i1.10244.
Full textWei, Yan Na, Y. T. Jin, and J. W. Zhou. "Design and Realization of RSA Digital Signature System Based on Digital Certificate." Applied Mechanics and Materials 743 (March 2015): 698–701. http://dx.doi.org/10.4028/www.scientific.net/amm.743.698.
Full textMUSTAFA, HUSSEIN, ELHADY MAHMOUD ABD, HAMDY SARA, and ALSOBKY WAGEDA. "DESIGNING NEW TECHNIQUE IN DIGITAL SIGNATURE BASED ON GALOIS FIELD 2n AND CHAOTIC MAPS." Seybold Report Journal 18, no. 09 (2023): 53–72. https://doi.org/10.5281/zenodo.8344314.
Full textChubaievskyi, Vitalii, Nataliia Lutska, Tetyana Savchenko, Lidiia Vlasenko, and Kyrylo Synelnyk. "ENHANCED CRYPTOGRAPHIC SECURITY OF AGGREGATED DIGITAL SIGNATURES THROUGH UTILIZATION OF A UNIFIED AUTHENTICATION FRAMEWORK." Cybersecurity: Education, Science, Technique 2, no. 22 (2023): 39–53. http://dx.doi.org/10.28925/2663-4023.2023.22.3953.
Full textXu, Jingkun. "A Comprehensive Study of Digital Signatures: Algorithms, Challenges and Future Prospects." ITM Web of Conferences 73 (2025): 03009. https://doi.org/10.1051/itmconf/20257303009.
Full textIhwani, Mohamad. "INFORMATION SECURITY MODEL BASED DIGITAL SIGNATURE ALGORITHM WITH RSA ALGORITHM." Computer Engineering, Science and System Journal 1, no. 1 (2016): 15–20. http://dx.doi.org/10.24114/cess.v1i1.4037.
Full textLyu, Shuhan. "Advances in Digital Signature Algorithms: Performance, Security and Future Prospects." ITM Web of Conferences 73 (2025): 03010. https://doi.org/10.1051/itmconf/20257303010.
Full textHarta, I. Gede Bendesa Aria, I. Ketut Gede Suhartana, I. Gusti Ngurah Anom Cahyadi, Cokorda Pramartha, I. Komang Ari Mogi, and Made Agung Raharja. "Pengamanan Lontar Digital Dengan Tanda Tangan Digital Menggunakan Algoritma RSA." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 10, no. 2 (2022): 199. http://dx.doi.org/10.24843/jlk.2021.v10.i02.p02.
Full textPrabowo, Egi Cahyo, and Irawan Afrianto. "PENERAPAN DIGITAL SIGNATURE DAN KRIPTOGRAFI PADA OTENTIKASI SERTIFIKAT TANAH DIGITAL." Komputa : Jurnal Ilmiah Komputer dan Informatika 6, no. 2 (2017): 83–90. http://dx.doi.org/10.34010/komputa.v6i2.2481.
Full textFang, Yuchen. "A research on different digital signature schemes." Applied and Computational Engineering 16, no. 1 (2023): 27–35. http://dx.doi.org/10.54254/2755-2721/16/20230855.
Full textDing, Mashuo. "Analyzing the Research and Application of the RSA Cryptosystem in the Context of Digital Signatures." Transactions on Computer Science and Intelligent Systems Research 5 (August 12, 2024): 26–34. http://dx.doi.org/10.62051/j2p6g984.
Full textR., SaiGanesh*1 Dr. K. Venkataramana2. "Optimized Digital Signature Algorithm with Multi-Prime RSA." International Journal of Scientific Research and Technology 2, no. 3 (2025): 434–39. https://doi.org/10.5281/zenodo.15078329.
Full textXu, Qiu-Liang, and Tzer-Shyong Chen. "An efficient threshold RSA digital signature scheme." Applied Mathematics and Computation 166, no. 1 (2005): 25–34. http://dx.doi.org/10.1016/j.amc.2004.04.054.
Full textKim, Dae-Youb, and Hak-Soo Ju. "A Study On Forward Secure Mediated RSA Digital Signature." KIPS Transactions:PartC 14C, no. 2 (2007): 123–28. http://dx.doi.org/10.3745/kipstc.2007.14-c.2.123.
Full textXu, Zhanji. "The Advance of Digital Signature with Quantum Computing." Highlights in Science, Engineering and Technology 39 (April 1, 2023): 1111–21. http://dx.doi.org/10.54097/hset.v39i.6716.
Full textRana, Deepanshu. "Advancements and Comparative Analysis of Digital Signature Algorithms: A Review." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 5778–92. http://dx.doi.org/10.22214/ijraset.2024.62955.
Full textPauziah, Arpa, and M. Izman Herdiansyah. "IMPLEMENTASI DIGITAL SIGNATURE PADA ARSIP DI DINAS KEARSIPAN PROVINSI SUMATERA SELATAN." Jusikom : Jurnal Sistem Komputer Musirawas 7, no. 2 (2022): 144–55. http://dx.doi.org/10.32767/jusikom.v7i2.1817.
Full textMu, Jian. "Application of Digital Signatures in the Field of E-commerce." Applied and Computational Engineering 117, no. 1 (2025): 198–209. https://doi.org/10.54254/2755-2721/2025.20951.
Full textIavich, Maksim, Tamari Kuchukhidze, and Razvan Bocu. "Post-Quantum Digital Signature: Verkle-Based HORST." Journal of Cybersecurity and Privacy 5, no. 2 (2025): 28. https://doi.org/10.3390/jcp5020028.
Full textXiao, Zhen Jiu, Zheng Tao Jiang, Yong Bin Wang, and Hong Chen. "Improved RSA Algorithm and Application in Digital Signature." Applied Mechanics and Materials 713-715 (January 2015): 1741–45. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.1741.
Full textAdeniyi, Emmanuel A., Peace Busola Falola, Mashael S. Maashi, Mohammed Aljebreen, and Salil Bharany. "Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions." Information 13, no. 10 (2022): 442. http://dx.doi.org/10.3390/info13100442.
Full textNazal, Muhammad Asghar, Reza Pulungan, and Mardhani Riasetiawan. "Data Integrity and Security using Keccak and Digital Signature Algorithm (DSA)." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 13, no. 3 (2019): 273. http://dx.doi.org/10.22146/ijccs.47267.
Full textSönmez, Burcu, and Ahmet Bedri Özer. "Power Side Channel Analysis and Anomaly Detection of Modular Exponentiation Method in Digital Signature Algorithm Based Fpga." ITM Web of Conferences 22 (2018): 01041. http://dx.doi.org/10.1051/itmconf/20182201041.
Full textHuang, Eric. "An Exploration of RSA Encryption." Innovation in Science and Technology 3, no. 6 (2024): 83–86. https://doi.org/10.56397/ist.2024.11.09.
Full textSun, Feifei, and Guohong Shi. "Application Research in Computer Vision Signature Encryption System of Enterprise Contract Economic Management." Wireless Communications and Mobile Computing 2022 (May 13, 2022): 1–5. http://dx.doi.org/10.1155/2022/9677942.
Full textWahid, Abdul, Jumadi Mabe Parenreng, and Iin Mahgafhira. "Pengembangan Sistem Otentikasi Dokumen Digital Jurusan Teknik Informatika Dan Komputer Fakultas Teknik UNM Berbasis Digital Signature." Progressive Information, Security, Computer, and Embedded System 1, no. 2 (2023): 115–25. http://dx.doi.org/10.61255/pisces.v1i2.151.
Full textOctora Ginting, Ferraro S., Veithzal Rivai Zainal, and Aziz Hakim. "Digital Signature Standard Implementation Strategy by Optimizing Hash Functions Through Performance Optimization." Journal of Accounting and Finance Management 3, no. 6 (2023): 362–71. http://dx.doi.org/10.38035/jafm.v3i6.175.
Full textSingh Bhadoria, Anurag, and Anurag Jain. "A Review of Digital Signature Using Different Elliptic Cryptography Technique." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 8 (2016): 6976–78. http://dx.doi.org/10.24297/ijct.v15i8.1499.
Full textHaraty, Ramzi A., A. N. El-Kassar, and Bilal Shibaro. "A Comparative Study of RSA Based Digital Signature Algorithms." Journal of Mathematics and Statistics 2, no. 1 (2006): 354–59. http://dx.doi.org/10.3844/jmssp.2006.354.359.
Full textA, Sangita. "Analytical Study of Modified RSA Algorithms for Digital Signature." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 3 (2015): 944–49. http://dx.doi.org/10.17762/ijritcc2321-8169.150310.
Full textMeng, Hui, and Zixin Sang. "Research and Development of Digital Signatures." Journal of Computing and Electronic Information Management 16, no. 3 (2025): 23–28. https://doi.org/10.54097/2g9b0j24.
Full textHanyfa Sari, Nur. "Penerapan Teknik Digital Signature Dalam Pengamanan Piagam Penghargaan Menggunakan Algoritma SHA-1 dan RSA." Management of Information System Journal 2, no. 3 (2024): 55–67. http://dx.doi.org/10.47065/mis.v2i3.1465.
Full textHandoko, Lekso Budi, Chaerul Umam, De Rosal Ignatius Moses Setiadi, and Eko Hari Rachmawanto. "DIGITAL SIGNATURE PADA CITRA MENGGUNAKAN RSA DAN VIGENERE CIPHER BERBASIS MD5." Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 10, no. 1 (2019): 357–66. http://dx.doi.org/10.24176/simet.v10i1.2212.
Full textSihombing, Grace Lamudur Arta. "HYBRID CHRIPTOGRAPHY STREAM CIPHER AND RSA ALGORITHM WITH DIGITAL SIGNATURE AS A KEY." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 1, no. 2 (2017): 75–83. http://dx.doi.org/10.30743/infotekjar.v1i2.66.
Full textMohit, Prerna, and G. P. Biswas. "Modification of Traditional RSA into Symmetric-RSA Cryptosystems." International Journal of Business Data Communications and Networking 13, no. 1 (2017): 66–73. http://dx.doi.org/10.4018/ijbdcn.2017010106.
Full textLorien, Antika, and Theophilus Wellem. "Implementasi Sistem Otentikasi Dokumen Berbasis Quick Response (QR) Code dan Digital Signature." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 4 (2021): 663–71. http://dx.doi.org/10.29207/resti.v5i4.3316.
Full textLưu Hồng Dũng, Nguyen Kim Tuan, Nong Phuong Trang, and Pham Van Quoc. "A solution for constructing quantum – resistant digital signature schemes." Journal of Military Science and Technology, CSCE8 (December 30, 2024): 108–18. https://doi.org/10.54939/1859-1043.j.mst.csce8.2024.108-118.
Full textMusa, Midila Ahmed. "Digital Signature with RSA Public Key Cryptography for Data Integrity in SOSE-Based E-Government Systems." International Journal of Management, Technology, and Social Sciences (IJMTS) 7, no. 1 (2022): 59–70. https://doi.org/10.5281/zenodo.5918479.
Full textOpiłka, Filip, Marcin Niemiec, Maria Gagliardi, and Michail Alexandros Kourtis. "Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature." Applied Sciences 14, no. 12 (2024): 4994. http://dx.doi.org/10.3390/app14124994.
Full textAmjad, Ghous, Kevin Yeo, and Moti Yung. "RSA Blind Signatures with Public Metadata." Proceedings on Privacy Enhancing Technologies 2025, no. 1 (2025): 37–57. http://dx.doi.org/10.56553/popets-2025-0004.
Full textDziechciarz, Dominik, and Marcin Niemiec. "Efficiency Analysis of NIST-Standardized Post-Quantum Cryptographic Algorithms for Digital Signatures in Various Environments." Electronics 14, no. 1 (2024): 70. https://doi.org/10.3390/electronics14010070.
Full textIdrush, G. Mahammad. "Offensive Language and Image Identification on Social Media Based on Text and Image Classification." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 2148–52. https://doi.org/10.22214/ijraset.2025.70351.
Full textXIAO, Zhenjiu, Chi HU, and Hong CHEN. "Research and implementation of four-prime RSA digital signature algorithm." Journal of Computer Applications 33, no. 5 (2013): 1374–77. http://dx.doi.org/10.3724/sp.j.1087.2013.01374.
Full textZhang, C. N. "Integrated approach for fault tolerance and digital signature in RSA." IEE Proceedings - Computers and Digital Techniques 146, no. 3 (1999): 151. http://dx.doi.org/10.1049/ip-cdt:19990217.
Full textHussein, Nehad Hameed. "Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain." Journal of Engineering 21, no. 4 (2015): 21–41. http://dx.doi.org/10.31026/j.eng.2015.04.02.
Full textDuc, Nguyen Tan, Nguyen Nam Hai, and Nguyen Hieu Minh. "Blind multi-signature scheme based on factoring and discrete logarithm problem." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 5 (2019): 2327–34. https://doi.org/10.12928/TELKOMNIKA.v17i5.10525.
Full textHutasuhut, Budi K., Syahril Efendi, and Zakarias Situmorang. "Digital Signature untuk Menjaga Keaslian Data dengan Algoritma MD5 dan Algoritma RSA." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 3, no. 2 (2019): 164–69. http://dx.doi.org/10.30743/infotekjar.v3i2.1019.
Full textFatma, Yulia, Evans Fuad, Soni, and Agusriadi. "Aplikasi Tandatangan Digital dalam Proses Verifikasi dan Validasi Sertifikat Covid-19." Techno.Com 22, no. 1 (2023): 134–44. http://dx.doi.org/10.33633/tc.v22i1.7091.
Full textPaulus, Erick, and Mochamad Azmi Fauzan. "A Framework to Ensure Data Integrity and Safety." Data Science: Journal of Computing and Applied Informatics 2, no. 1 (2018): 1–11. http://dx.doi.org/10.32734/jocai.v2.i1-90.
Full text