Sciweavers

985 search results - page 12 / 197
» On the validity of digital signatures
Sort
View
EUROCRYPT
2012
Springer
11 years 11 months ago
Lattice Signatures without Trapdoors
We provide an alternative method for constructing lattice-based digital signatures which does not use the “hash-and-sign” methodology of Gentry, Peikert, and Vaikuntanathan (ST...
Vadim Lyubashevsky
PKC
1999
Springer
142views Cryptology» more  PKC 1999»
14 years 1 months ago
Encrypted Message Authentication by Firewalls
Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant information encapsulated into proto...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
DCC
2002
IEEE
14 years 8 months ago
On the Security of the Digital Signature Algorithm
Ian F. Blake, Theodoulos Garefalakis
CSJM
2006
77views more  CSJM 2006»
13 years 8 months ago
An Approach to Shorten Digital Signature Length
A new method is proposed to design short signature schemes based on difficulty of factorizing a composite number n = qr, where q and r are two large primes. Using the method new d...
Nikolay A. Moldovyan
EUROCRYPT
1995
Springer
14 years 9 days ago
Verifiable Signature Sharing
Abstract. We introduce Verifiable Signature Sharing (VCS), a cryptographic primitive for protecting digital signatures. VCS enables the holder of a digitally signed document, who m...
Matthew K. Franklin, Michael K. Reiter