Sciweavers

569 search results - page 22 / 114
» On the Security of the Digital Signature Algorithm
Sort
View
ETRICS
2006
14 years 4 days ago
Visual Document Authentication Using Human-Recognizable Watermarks
Digital signatures and message authentication codes are well known methods for ensuring message integrity. However, they rely on computations which are too hard to be performed by ...
Igor Fischer, Thorsten Herfet
PKC
2009
Springer
121views Cryptology» more  PKC 2009»
14 years 9 months ago
On the Theory and Practice of Personal Digital Signatures
We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent pla...
Gert Læssøe Mikkelsen, Ivan Damg&arin...
CORR
2010
Springer
138views Education» more  CORR 2010»
13 years 8 months ago
The Digital Signature Scheme MQQ-SIG
Abstract: This document contains the Intellectual Property Statement and the technical description of the MQQ-SIG - a new public key digital signature scheme. The complete scientif...
Danilo Gligoroski, Svein Johan Knapskog, Smile Mar...
CSFW
2008
IEEE
14 years 2 months ago
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Composition theorems in simulation-based approaches allow to build complex protocols from sub-protocols in a modular way. However, as first pointed out and studied by Canetti and ...
Ralf Küsters, Max Tuengerthal
CRYPTO
1998
Springer
106views Cryptology» more  CRYPTO 1998»
14 years 21 days ago
New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications
Verifiable Signature Sharing (VS ) enables the recipient of a digital signature, who is not necessarily the original signer, to share such signature among n proxies so that a subse...
Dario Catalano, Rosario Gennaro