Back to Results
First PageMeta Content
RSA / Full Domain Hash / Cryptographic hash function / Random oracle / PKCS / Lamport signature / Rabin signature algorithm / Cryptography / Public-key cryptography / Digital signature


Chapter 12 Digital signatures In the public key setting, the primitive used to provide data integrity is a digital signature scheme. In this chapter we look at security notions and constructions for this primitive.
Add to Reading List

Document Date: 2009-09-20 23:36:52


Open Document

File Size: 189,38 KB

Share Result on Facebook

Company

VF / RSA Labs / Security Dynamics Corporation / /

IndustryTerm

stateless signature algorithm / generation algorithm / verification algorithm / deterministic verification algorithm / above key generation algorithm / verification algorithms / encryption algorithms / above verification algorithm / signature algorithm / encryption algorithm / /

Product

M1 / /

Technology

encryption / cryptography / deterministic / stateless signature algorithm / RAM / three algorithms / deterministic verification algorithm / randomized algorithm / key generation algorithm / encryption algorithms / public key / verification algorithms / signing algorithm / encryption algorithm / above verification algorithm / above key generation algorithm / verification algorithm / signature algorithm / secret key / verifying algorithm / digital signature / key-generation algorithm / /

SocialTag