Sciweavers

468 search results - page 15 / 94
» A Certified Digital Signature
Sort
View
CARDIS
2008
Springer
105views Hardware» more  CARDIS 2008»
13 years 12 months ago
Fast Hash-Based Signatures on Constrained Devices
Digital signatures are one of the most important applications of microprocessor smart cards. The most widely used algorithms for digital signatures, RSA and ECDSA, depend on finite...
Sebastian Rohde, Thomas Eisenbarth, Erik Dahmen, J...
ITRUST
2005
Springer
14 years 3 months ago
Security and Trust in the Italian Legal Digital Signature Framework
Abstract. The early adoption of a national, legal digital signature framework in Italy has brought forth a series of problems and vulnerabilities. In this paper we describe each of...
Stefano Zanero
ASIACRYPT
2001
Springer
14 years 2 months ago
How to Achieve a McEliece-Based Digital Signature Scheme
Abstract. McEliece is one of the oldest known public key cryptosystems. Though it was less widely studied than RSA, it is remarkable that all known attacks are still exponential. I...
Nicolas Courtois, Matthieu Finiasz, Nicolas Sendri...
ISN
1998
Springer
14 years 1 months ago
See What You Sign: Secure Implementations of Digital Signatures
An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Inte...
Arnd Weber
DL
1998
Springer
144views Digital Library» more  DL 1998»
14 years 2 months ago
Archival Storage for Digital Libraries
We propose an architecture for Digital Library Repositories that assures long-term archival storage of digital objects. The architecture is formed by a federation of independent b...
Arturo Crespo, Hector Garcia-Molina