Sciweavers

569 search results - page 34 / 114
» On the Security of the Digital Signature Algorithm
Sort
View
AMC
2005
126views more  AMC 2005»
13 years 8 months ago
Security of a multisignature scheme for specified group of verifiers
A multisignature scheme for specified group of verifiers needs a group of signers' cooperation to sign a message to a specified group of verifiers that must cooperate to check...
Jiqiang Lv, Xinmei Wang, Kwangjo Kim
CORR
2010
Springer
82views Education» more  CORR 2010»
13 years 8 months ago
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images
this paper demonstrates analysis of well known block cipher CAST-128 and its modified version using avalanche criterion and other tests namely encryption quality, correlation coeff...
G. N. Krishnamurthy, V. Ramaswamy
IMSCCS
2007
IEEE
14 years 2 months ago
Control Flow Checking Algorithm using Soft-based Intra-/Inter-block Assigned-Signature
In radiation environments, alpha particles, cosmic rays and solar wind flux can cause a single event upset (SEU), which is one of the major sources of bit-flips in digital electro...
Yanxia Wu, Guochang Gu, Shaobin Huang, Jun Ni
DASFAA
2006
IEEE
134views Database» more  DASFAA 2006»
14 years 2 months ago
Authentication of Outsourced Databases Using Signature Aggregation and Chaining
Database outsourcing is an important emerging trend which involves data owners delegating their data management needs to an external service provider. Since a service provider is a...
Maithili Narasimha, Gene Tsudik
CSCWD
2008
Springer
13 years 10 months ago
XML and web services security
With an increasing amount of semi-structured data XML has become important. XML documents may contain private information that cannot be shared by all user communities. Therefore,...
Lili Sun, Yan Li