Search

Your search keyword '"DIGITAL signatures"' showing total 311 results

Search Constraints

Start Over You searched for: Descriptor "DIGITAL signatures" Remove constraint Descriptor: "DIGITAL signatures" Topic cryptography Remove constraint Topic: cryptography
311 results on '"DIGITAL signatures"'

Search Results

1. Certificateless directed signature scheme without bilinear pairing.

2. Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors.

3. Exploring the solution space: CB-WCA for efficient finite field multiplication in post-quantum cryptography.

4. A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions.

5. K-XMSS and K-SPHINCS + : Enhancing Security in Next-Generation Mobile Communication and Internet Systems with Hash Based Signatures Using Korean Cryptography Algorithms.

6. A Survey of Post-Quantum Cryptography: Start of a New Race.

7. Novel Forgery Mechanisms in Multivariate Signature Schemes.

8. A Multi-Party Functional Signatures Scheme for Private Blockchain.

9. Identity-Based Proxy Signature with Message Recovery over NTRU Lattice.

10. AES Based White Box Cryptography in Digital Signature Verification.

11. An Extensive Study of Flexible Design Methods for the Number Theoretic Transform.

12. Healthcare Internet of Things (HIoT) data security enhancement using blockchain technology.

13. Adaptable Cryptographic Primitives in Blockchains via Smart Contracts.

14. Small Private Exponent Attacks on RSA Using Continued Fractions and Multicore Systems.

15. Research on the optimization of communication protocol in network security protocol.

16. Efficient, Flexible, and Constant-Time Gaussian Sampling Hardware for Lattice Cryptography.

17. Transferable Quantum Cheque Scheme Based on Quantum Public-Key Cryptography.

18. Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA.

19. Comments on efficient batch verification test for digital signatures based on elliptic curves.

20. A Novel Undeniable (t , n)-Threshold Signature with Cheater Identification.

21. Medical Image Compression and Encryption Using Adaptive Arithmetic Coding, Quantization Technique and RSA in DWT Domain.

22. MLPD: a multi-layer protection with deduplication technique to preserve audio file transmission over the public domain.

23. Development of Novel Blockchain Technology for Certificate Management System using Cognitive Image Steganography Techniques.

24. A Review on E-Voting Based on Blockchain Models.

25. Cryptanalysis and improvement of a (t, n) threshold group signature scheme.

26. Hardware Limitations to Secure C-ITS: Experimental Evaluation and Solutions.

27. Statistical inference attack against PHY-layer key extraction and countermeasures.

28. Secure Hash Algorithms and the Corresponding FPGA Optimization Techniques.

29. Cryptanalysis and improvement of a blind multi-document signcryption scheme.

30. Quantum Proxy Threshold Multiple Signature Scheme.

31. Efficient Hardware Implementations of Legendre Symbol Suitable for MPC Applications.

32. Development of electronic digital signature algorithms with compound modules and their cryptanalysis.

33. Speeding-up verification of digital signatures.

34. Efficient pre-authentication scheme for inter-ASN handover in high mobility MANET.

35. Provably Secure Group Signature Schemes From Code-Based Assumptions.

36. ON THE EFFICIENCY OF THE LAMPORT SIGNATURE SCHEME.

37. An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problem.

38. Trust Management Scheme Based on Hybrid Cryptography for Secure Communications in VANETs.

39. A new encryption scheme for multivariate quadratic systems.

40. On Kummer Lines with Full Rational 2-torsion and Their Usage in Cryptography.

41. 量子計算對當代密碼系統之威脅及對策.

42. Post-Quantum Lattice-Based Cryptography Implementations: A Survey.

43. An efficient and secure identity based multiple signatures scheme based on RSA.

44. Embedding Digital Signature Using Encrypted-Hashing for Protection of DSP Cores in CE.

45. A scheme on converting quantum deniable authentication into universal quantum designated verifier signature.

46. SpyDetector: An approach for detecting side-channel attacks at runtime.

47. Efficient Certificate-Based Signature with Short Key and Signature Sizes from Lattices.

48. An Efficient Implementation of the NewHope Key Exchange on FPGAs.

49. Efficient digital signatures from RSA without random oracles.

50. Finding the maximal adversary structure from any given access structure.

Catalog

Books, media, physical & digital resources