<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Elliptic curve cryptography / Digital Signature Standard / Key management / Elliptic Curve Digital Signature Algorithm / Digital signature / Digital Signature Algorithm / EdDSA / Key / Domain Name System Security Extensions / Homomorphic encryption
Date: 2018-02-28 05:05:12
Cryptography
Public-key cryptography
Elliptic curve cryptography
Digital Signature Standard
Key management
Elliptic Curve Digital Signature Algorithm
Digital signature
Digital Signature Algorithm
EdDSA
Key
Domain Name System Security Extensions
Homomorphic encryption

Short Double- and N -Times-Authentication-Preventing Signatures from ECDSA and More David Derler1 , Sebastian Ramacher1 , and Daniel Slamanig2 1

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 502,99 KB

Share Document on Facebook

Similar Documents

Foxit PhantomPDF Certified Compliant with SAFE-BioPharma® Digital Signature Standard Certification Addresses Critical Industry Need for Proof of Identity Associated with Digital Signatures on Regulatory Submissions FREM

Foxit PhantomPDF Certified Compliant with SAFE-BioPharma® Digital Signature Standard Certification Addresses Critical Industry Need for Proof of Identity Associated with Digital Signatures on Regulatory Submissions FREM

DocID: 1srdd - View Document

Proceedings  - NN - RFIDSec08

Proceedings - NN - RFIDSec08

DocID: 1qGBX - View Document

PPI Sign app Secure login to portals via smartphone Portal login and EBICS signatures via smartphone in accordance with the minimum requirements for the security of internet payments

PPI Sign app Secure login to portals via smartphone Portal login and EBICS signatures via smartphone in accordance with the minimum requirements for the security of internet payments

DocID: 1oHX8 - View Document

FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

DocID: 1lHQo - View Document

THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

DocID: 1gs9P - View Document