ElGamal signature scheme

Results: 32



#Item
11Lattice-based Fault Attacks on DSA - Another Possible Strategy

Lattice-based Fault Attacks on DSA - Another Possible Strategy

Add to Reading List

Source URL: crypto.hyperlink.cz

Language: English - Date: 2005-08-29 10:42:00
12Cryptographic Insecurity of the Test&Repeat Paradigm

Cryptographic Insecurity of the Test&Repeat Paradigm

Add to Reading List

Source URL: crypto.hyperlink.cz

Language: English - Date: 2005-08-29 10:42:00
13CS255: Cryptography and Computer Security  Winter 2004 Final Exam Instructions

CS255: Cryptography and Computer Security Winter 2004 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-03-01 20:32:14
14A Signature Scheme as Secure as the Diffie-Hellman Problem Eu-Jin Goh and StanisÃlaw Jarecki Computer Science Department, Stanford University, Stanford CA[removed]removed], [removed]

A Signature Scheme as Secure as the Diffie-Hellman Problem Eu-Jin Goh and StanisÃlaw Jarecki Computer Science Department, Stanford University, Stanford CA[removed]removed], [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:52
15The Elliptic Curve Digital Signature Algorithm (ECDSA)    

The Elliptic Curve Digital Signature Algorithm (ECDSA)    

Add to Reading List

Source URL: cs.ucsb.edu

Language: English - Date: 2009-10-15 20:03:40
16PSS is Secure against Random Fault Attacks Jean-S´ebastien Coron and Avradip Mandal University of Luxembourg Abstract. A fault attack consists in inducing hardware malfunctions in order to recover secrets from electroni

PSS is Secure against Random Fault Attacks Jean-S´ebastien Coron and Avradip Mandal University of Luxembourg Abstract. A fault attack consists in inducing hardware malfunctions in order to recover secrets from electroni

Add to Reading List

Source URL: www.jscoron.fr

Language: English - Date: 2014-12-02 03:11:30
17Efficient One-time Proxy Signatures Huaxiong Wang and Josef Pieprzyk Centre for Advanced Computing – Algorithms and Cryptography Department of Computing Macquarie University Sydney, NSW 2109, AUSTRALIA

Efficient One-time Proxy Signatures Huaxiong Wang and Josef Pieprzyk Centre for Advanced Computing – Algorithms and Cryptography Department of Computing Macquarie University Sydney, NSW 2109, AUSTRALIA

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
18An extended abstract of this work appeared in: Public-Key Cryptography – Proceedings of PKC ’07 (April 16–[removed], Beijing, China) T. Okamoto and X. Wang Eds. Springer-Verlag, LNCS 4450, pages 217–232. Improved O

An extended abstract of this work appeared in: Public-Key Cryptography – Proceedings of PKC ’07 (April 16–[removed], Beijing, China) T. Okamoto and X. Wang Eds. Springer-Verlag, LNCS 4450, pages 217–232. Improved O

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:18
19A Study on Lattice-Based Public-Key Cryptosystems 05M37122 Keita Xagawa Supervisor: Keisuke Tanaka Department of Mathematical and Computing Sciences Tokyo Institute of Technology

A Study on Lattice-Based Public-Key Cryptosystems 05M37122 Keita Xagawa Supervisor: Keisuke Tanaka Department of Mathematical and Computing Sciences Tokyo Institute of Technology

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2010-01-23 11:51:00
20Fully Self-Organized Peer-to-Peer Key Management for Mobile Ad Hoc Networks Johann van der Merwe Dawoud Dawoud

Fully Self-Organized Peer-to-Peer Key Management for Mobile Ad Hoc Networks Johann van der Merwe Dawoud Dawoud

Add to Reading List

Source URL: johannvandermerwe.co.za

Language: English - Date: 2013-06-28 06:17:54