Digital Signature Standard

Results: 72



#Item
11Algorithm / Mathematical logic / Theoretical computer science / Advanced Encryption Standard / Depth-first search / Directed acyclic graph / Digital signature / Cryptography / Mathematics / Search algorithms

Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph Isomorphism Pierre Lestringant* Frédéric Guihéry*

Add to Reading List

Source URL: www.amossys.fr

Language: English - Date: 2015-05-07 04:40:10
12Random oracle / Forking lemma / Advantage / Schnorr signature / Full Domain Hash / Standard model / Public-key cryptography / Cryptography / Ciphertext indistinguishability / Digital signature

Tightly-Secure Signatures From Lossy Identification Schemes Michel Abdalla1 , Pierre-Alain Fouque2 , Vadim Lyubashevsky1 , and Mehdi Tibouchi3 ´ Ecole

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-18 04:58:38
13Digital signature / Elliptic Curve DSA / Public key certificate / SHA-1 / Federal Information Processing Standard / RSA / Non-repudiation / Data Encryption Standard / Secure Hash Standard / Cryptography / Public-key cryptography / Digital Signature Algorithm

FIPS PUB 186-2 (+Change Notice) FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION 2000 January 27

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2002-12-15 10:57:16
14SHA-1 / Key management / Digital Signature Algorithm / Secure Hash Standard / Digital signature / Data Encryption Standard / Crypt / SHA-2 / Cryptography standards / Cryptography / Cryptographic hash functions / Public-key cryptography

U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2002-12-15 10:54:51
15Key management / Secure multi-party computation / Secure two-party computation / Cheque / Digital signature / Standard model / Random oracle / Certificate authority / Universal composability / Cryptography / Cryptographic protocols / Public-key cryptography

Legally Enforceable Fairness in Secure Two-Party Computation∗ Yehuda Lindell† Department of Computer Science Bar-Ilan University, Israel.

Add to Reading List

Source URL: cjtcs.cs.uchicago.edu

Language: English - Date: 2009-07-16 07:03:28
16Secure multi-party computation / Secure two-party computation / Cheque / Digital signature / Standard model / Random oracle / Cryptography / Cryptographic protocols / Public-key cryptography

Legally Enforceable Fairness in Secure Two-Party Computation

Add to Reading List

Source URL: cjtcs.cs.uchicago.edu

Language: English - Date: 2011-07-07 17:00:19
17Advantage / Random oracle / RSA / Parity of a permutation / ElGamal signature scheme / Cryptography / Public-key cryptography / Digital signature

Verifiably Committed Signatures Provably Secure in The Standard Complexity Model Huafei Zhu Department of Information Science and Electronics Engineering, ZheJiang University, YuQuan Campus, HangZhou, 310027, PR. China E

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-01 04:50:33
18Random oracle / Blind signature / Oracle Corporation / Digital signature / Oracle Database / Standard model / Anonymity / United States dollar / Cryptography / Public-key cryptography / Financial cryptography

Fair Multiple-bank E-cash in the Standard Model∗ Jiangxiao Zhang1 , Yanwu Gao1 , Chunhui Feng1 , Hua Guo2 , Zhoujun Li2 1 2 Mathematics and Information Technology Institute, Xingtai University, Xingtai, Hebei,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-18 07:48:26
19Cryptography / Abstract algebra / Linear algebra / Information theory / Network coding / Vector space / Digital signature / Linear map / Homomorphic signatures for network coding / Algebra / Mathematics / Finite fields

Efficient Network Coding Signatures in the Standard Model Dario Catalano1 , Dario Fiore2? and Bogdan Warinschi3 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-03-14 12:17:36
20Digital signature / Group signature / Proof of knowledge / Designated verifier signature / Zero-knowledge proof / RSA / Ring signature / IP / NP / Cryptography / Public-key cryptography / Cryptographic protocols

Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures∗ Siamak F Shahandashti  

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-05 21:04:21
UPDATE