Search

Your search keyword '"DIGITAL signatures"' showing total 125 results

Search Constraints

Start Over You searched for: Descriptor "DIGITAL signatures" Remove constraint Descriptor: "DIGITAL signatures" Topic algorithms Remove constraint Topic: algorithms
125 results on '"DIGITAL signatures"'

Search Results

1. Signcryption technique with generalization of the Elgamal algorithm and Ong-Schnorr-Shamir algorithm on digital messages.

2. Designing and building a web-based electronic service manuscript application by making comparisons of AES and blowfish algorithms for securing data in the database.

3. Analysis and Design of Identity Authentication for IoT Devices in the Blockchain Using Hashing and Digital Signature Algorithms.

4. Performance and Applicability of Post-Quantum Digital Signature Algorithms in Resource-Constrained Environments.

5. Enhancing IoT Security through a Green and Sustainable Federated Learning Platform: Leveraging Efficient Encryption and the Quondam Signature Algorithm.

6. Digital signature authentication system in SIMP3M web application of research assessment services at Politeknik Negeri Batam.

7. Post-Quantum Cryptography: Cryptographers seek algorithms quantum computers cannot break.

8. K-XMSS and K-SPHINCS + : Enhancing Security in Next-Generation Mobile Communication and Internet Systems with Hash Based Signatures Using Korean Cryptography Algorithms.

9. 一种嵌入式设备固件安全更新方案.

10. Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes.

11. Blockchain Security Mechanism Design Based on Chinese Cryptosystem SM2 Algorithm.

12. Improved SRP algorithm and bidirectional heterogeneous LTE‐R authentication key.

13. Hybrid domain digital watermarking scheme based on improved differential evolution algorithm and singular value block embedding.

14. Authorization and privacy preservation in cloud-based distributed ehr system using blockchain technology and anonymous digital ring signature.

15. Information Security Protection of Internet of Energy Using Ensemble Public Key Algorithm under Big Data.

16. A new type of digital signature algorithms with a hidden group.

17. Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing.

18. Quantum signature based on multi-arbitrators and product states.

19. Speeding-Up Elliptic Curve Cryptography Algorithms.

20. Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions.

21. An algorithm for generating a shared secret key based on a key pair of the first signature algorithm of the O'zDst1092:2009 standard.

22. No Need to Ask: Creating Permissionless Blockchains of Metadata Records.

23. A new quantum-safe multivariate polynomial public key digital signature algorithm.

24. New Code-Based Blind Signature Scheme.

25. Quantum blockchain based on asymmetric quantum encryption and a stake vote consensus algorithm.

26. Efficient Nyberg-Rueppel type of NTRU digital signature algorithm.

27. Smart contract-based secure cooperative spectrum sensing algorithm.

28. Efficient hardware prototype of ECDSA modules for blockchain applications.

29. Binary Tree Based Forward Secure Signature Scheme in the Random Oracle Model.

30. Secure Hash Algorithms and the Corresponding FPGA Optimization Techniques.

31. Modeling of Wireless Traffic Load in Next Generation Wireless Networks.

32. Model of Pseudo-Random Sequences Generated by Encryption and Compression Algorithms.

33. Development of electronic digital signature algorithms with compound modules and their cryptanalysis.

34. ESS‐IBAA: Efficient, short, and secure ID‐based authentication algorithm for wireless sensor network.

35. A practical digital signature scheme based on the hidden logarithm problem.

36. 格上具有完全前向安全0轮往返时间密钥交换协议.

37. Secure-channel free searchable encryption with multiple keywords: A generic construction, an instantiation, and its implementation.

38. Accountable Cross-Border Data Sharing Using Blockchain Under Relaxed Trust Assumption.

39. Quantum public-key signature scheme based on asymmetric quantum encryption with trapdoor information.

40. ON THE EFFICIENCY OF THE LAMPORT SIGNATURE SCHEME.

41. A new enhancement of elliptic curve digital signature algorithm.

42. Post-quantum commutative encryption algorithm.

43. 量子計算對當代密碼系統之威脅及對策.

44. WOTS-S: A Quantum Secure Compact Signature Scheme for Distributed Ledger.

45. Finding the maximal adversary structure from any given access structure.

46. Improved Fault-Tolerant Aggregate Signatures.

47. Quantum‐resistant authentication algorithms for satellite‐based augmentation systems.

48. Implementacion hardware de la funcion Hash SHA3-256 usando una arquitectura Pipeline.

49. Design and leakage assessment of side channel attack resistant binary edwards Elliptic Curve digital signature algorithm architectures.

50. Loop-Abort Faults on Lattice-Based Signature Schemes and Key Exchange Protocols.

Catalog

Books, media, physical & digital resources