Sciweavers

763 search results - page 8 / 153
» Digital Signatures Today
Sort
View
EUROCRYPT
2012
Springer
11 years 10 months ago
Lattice Signatures without Trapdoors
We provide an alternative method for constructing lattice-based digital signatures which does not use the “hash-and-sign” methodology of Gentry, Peikert, and Vaikuntanathan (ST...
Vadim Lyubashevsky
PKC
1999
Springer
142views Cryptology» more  PKC 1999»
13 years 11 months ago
Encrypted Message Authentication by Firewalls
Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant information encapsulated into proto...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
ETRICS
2006
13 years 11 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
DCC
2002
IEEE
14 years 7 months ago
On the Security of the Digital Signature Algorithm
Ian F. Blake, Theodoulos Garefalakis
CSJM
2006
77views more  CSJM 2006»
13 years 7 months ago
An Approach to Shorten Digital Signature Length
A new method is proposed to design short signature schemes based on difficulty of factorizing a composite number n = qr, where q and r are two large primes. Using the method new d...
Nikolay A. Moldovyan