Sciweavers

456 search results - page 4 / 92
» Rethinking Digital Signatures
Sort
View
IJNSEC
2008
128views more  IJNSEC 2008»
13 years 6 months ago
Attacking LCCC Batch Verification of RSA Signatures
Batch verification of digital signatures is used to improve the computational complexity when a large number of digital signatures must be verified. Lee at al. [2] proposed a new ...
Martin Stanek
ICONIP
2004
13 years 7 months ago
Signature Verification Using Static and Dynamic Features
Abstract. A signature verification algorithm based on static and dynamic features of online signature data is presented. Texture and topological features are the static features of...
Mayank Vatsa, Richa Singh, Pabitra Mitra, Afzel No...
ACNS
2005
Springer
111views Cryptology» more  ACNS 2005»
13 years 11 months ago
Digital Signatures Do Not Guarantee Exclusive Ownership
Digital signature systems provide a way to transfer trust from the public key to the signed data; this is used extensively within PKIs. However, some applications need a transfer o...
Thomas Pornin, Julien P. Stern
ASIACRYPT
2000
Springer
13 years 10 months ago
Unconditionally Secure Digital Signature Schemes Admitting Transferability
A potentially serious problem with current digital signature schemes is that their underlying hard problems from number theory may be solved by an innovative technique or a new gen...
Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hi...
IJNSEC
2011
239views more  IJNSEC 2011»
13 years 1 months ago
Digital Signature Scheme with Message Recovery Using Knapsack-based ECC
Digital signature authentication scheme provides secure communication between two users. Digital signatures guarantee end-to-end message integrity and authentication information a...
R. Rajaram Ramasamy, M. Amutha Prabakar