Sciweavers

569 search results - page 23 / 114
» On the Security of the Digital Signature Algorithm
Sort
View
ASIACRYPT
1992
Springer
14 years 17 days ago
On the Power of Memory in the Design of Collision Resistant Hash Functions
Collision resistant hash functions are an important basic tool for cryptographic applications such as digital signature schemes and integrity protection based on "fingerprinti...
Bart Preneel, René Govaerts, Joos Vandewall...
IACR
2011
129views more  IACR 2011»
12 years 8 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
TCC
2010
Springer
324views Cryptology» more  TCC 2010»
14 years 5 months ago
Leakage-Resilient Signatures
The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insuļ¬ƒcient due to ā€...
Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, G...
ACISP
2006
Springer
14 years 7 days ago
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. The techniques of digital signatures are generally considered a...
Shidi Xu, Yi Mu, Willy Susilo
CCS
1999
ACM
14 years 23 days ago
Signature Schemes Based on the Strong RSA Assumption
We describe and analyze a new digital signature scheme. The new scheme is quite eļ¬ƒcient, does not require the the signer to maintain any state, and can be proven secure against ...
Ronald Cramer, Victor Shoup