咨询与建议

限定检索结果

文献类型

  • 20 篇 期刊文献
  • 20 篇 会议

馆藏范围

  • 40 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 36 篇 工学
    • 25 篇 计算机科学与技术...
    • 12 篇 信息与通信工程
    • 10 篇 电气工程
    • 3 篇 机械工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 2 篇 软件工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 交通运输工程
    • 1 篇 网络空间安全
  • 7 篇 理学
    • 7 篇 数学
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 艺术学
    • 1 篇 美术学

主题

  • 40 篇 digital signatur...
  • 4 篇 elliptic curve c...
  • 4 篇 elliptic curve d...
  • 4 篇 digital signatur...
  • 4 篇 cryptography
  • 3 篇 lll algorithm
  • 3 篇 public key crypt...
  • 3 篇 authentication
  • 3 篇 rsa
  • 3 篇 post-quantum cry...
  • 3 篇 public key
  • 2 篇 falcon
  • 2 篇 intrusion detect...
  • 2 篇 special characte...
  • 2 篇 jpeg2000
  • 2 篇 discrete logarit...
  • 2 篇 babai's nearest ...
  • 2 篇 distortion reduc...
  • 2 篇 crystals-dilithi...
  • 2 篇 dsa

机构

  • 4 篇 aristotle univ t...
  • 3 篇 kookmin univ dep...
  • 1 篇 anhui univ inst ...
  • 1 篇 elect & telecomm...
  • 1 篇 inst informat in...
  • 1 篇 tunghai univ dep...
  • 1 篇 peoples secur ac...
  • 1 篇 anna univ ceg de...
  • 1 篇 jeppiaar engn co...
  • 1 篇 univ s florida d...
  • 1 篇 anna univ dept i...
  • 1 篇 univ missouri de...
  • 1 篇 inst informat se...
  • 1 篇 bml munjal univ ...
  • 1 篇 yeungnam univ de...
  • 1 篇 ho chi minh city...
  • 1 篇 chinese univ hon...
  • 1 篇 siddaganga inst ...
  • 1 篇 univ sci & techn...
  • 1 篇 vietnam natl uni...

作者

  • 4 篇 poulakis dimitri...
  • 3 篇 seo seog chung
  • 2 篇 draziotis konsta...
  • 2 篇 adamoudis marios
  • 1 篇 xue-tao zhang
  • 1 篇 tu phan
  • 1 篇 guo-juan song
  • 1 篇 oyanagi k
  • 1 篇 choi junhyeok
  • 1 篇 bose s.
  • 1 篇 park jong-yeon
  • 1 篇 jung heon hui
  • 1 篇 shaji r. s.
  • 1 篇 al-absi ahmed ab...
  • 1 篇 shiny r.
  • 1 篇 oh hyunyoung
  • 1 篇 shin donghyun
  • 1 篇 poulakis d.
  • 1 篇 chow sherman s. ...
  • 1 篇 chen ts

语言

  • 39 篇 英文
  • 1 篇 其他
检索条件"主题词=Digital Signature Algorithm"
40 条 记 录,以下是31-40 订阅
排序:
Some lattice attacks on DSA and ECDSA
收藏 引用
APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING 2011年 第5-6期22卷 347-358页
作者: Poulakis, Dimitrios Aristotle Univ Thessaloniki Dept Math Thessaloniki 54124 Greece
In this paper, using the LLL reduction method and computing the integral points of two classes of conics, we develop attacks on DSA and ECDSA in case where the secret and the ephemeral key of a signed message or their... 详细信息
来源: 评论
A SECURE CONFERENCE KEY PROTOCOL OVER ECC-BASED GREY SYSTEMS
收藏 引用
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL 2011年 第10期7卷 5717-5730页
作者: Chen, Tzer-Long Chung, Yu-Fang Lin, Frank Y. S. Natl Taiwan Univ Dept Informat Management Taipei 10617 Taiwan Tunghai Univ Dept Elect Engn Taichung 40704 Taiwan
In the current environment, there are only a limited number of third-parties that general users can trust in terms of authentication and verification. Often, the self-acclaimed independent third-parties are the partie... 详细信息
来源: 评论
Design of Hyper Elliptic Curve digital signature
Design of Hyper Elliptic Curve Digital Signature
收藏 引用
International Conference on Information Technology and Computer Science
作者: Deng Jian-zhi Cheng Xiao-hui Gui Qiong Guilin Univ Technol Dept Elect & Comp Sci Guilin Peoples R China
In computer cryptography, Hyper elliptic curve cryptography system is one of the best cryptography system. DSA signature algorithm is also an advanced digital signature algorithm. In this paper, it's banded hyper ... 详细信息
来源: 评论
Forward-Secure Proxy signature Scheme for Multiple Proxy Signers using DSA with Proxy Revocation
Forward-Secure Proxy Signature Scheme for Multiple Proxy Sig...
收藏 引用
IEEE International Advance Computing Conference
作者: Sunitha, N. R. Amberker, B. B. Siddaganga Inst Technol Dept Comp Sci & Engn Tumkur Karnataka India Natl Inst Technol Dept Comp Sci & Engn Warangal Andhra Pradesh India
A proxy signature scheme allows one user to delegate his/her signing capability to another user called a proxy signer in such a way that the latter can sign messages on behalf of the the former. After verification the... 详细信息
来源: 评论
Strong Diffie-Hellman-DSA key exchange
收藏 引用
IEEE COMMUNICATIONS LETTERS 2007年 第5期11卷 432-433页
作者: Jeong, Ik Rae Kwon, Jeong Ok Lee, Dong Hoon Elect & Telecommun Res Inst ETRI Taejon 305606 South Korea Korea Univ CIST Grad Sch Informat Secur Seoul 136701 South Korea
To provide authentication to the Diffie-Hellman key exchange, a few integrated key exchange schemes which provide authentication using the DSA signature have been proposed in the literature. In this letter we point ou... 详细信息
来源: 评论
Implementation of elliptic-curve cryptography on mobile healthcare devices
Implementation of elliptic-curve cryptography on mobile heal...
收藏 引用
IEEE International Conference on Networking, Sensing and Control
作者: Malhotra, K. Gardner, S. Patz, R. Univ Glamorgan Fac Adv Technol Ctr Elect Prod Engn Pontypridd CF37 1DL M Glam Wales
Over the past few years, much research attention has been afforded to the application of remote patient monitoring using embedded mobile devices. However, relatively little research has been done to investigate the se... 详细信息
来源: 评论
Improved DSA variant for batch verification
收藏 引用
APPLIED MATHEMATICS AND COMPUTATION 2005年 第1期169卷 75-81页
作者: Lin, CH Hsu, RH Harn, L Tunghai Univ Dept Comp Sci & Informat Engn Taichung 407 Taiwan Univ Missouri Dept Comp Networking Kansas City MO 64110 USA
Batch verification is a method to verify multiple signatures at once. There are two issues associated with batch verification. One is the security problem and the other is the computational speed. In 1998, Bellare et ... 详细信息
来源: 评论
Efficient sub-band coding in JPEG2000 for improved authentication and tamper-proofing
收藏 引用
IMAGING SCIENCE JOURNAL 2004年 第3期52卷 181-187页
作者: Chen, J Chen, TS Chen, JG Hungkuang Univ Dept Comp Sci & Informat Management Taichung 43309 Taiwan Natl Taichung Inst Technol Dept Informat Management Taichung 404 Taiwan
The LL sub-band from the discrete wavelet transform in JPEG2000 is similar to a smaller image of the original in spatial domain. The proposed authentication and tamper-proofing scheme is to extract and hide the entire... 详细信息
来源: 评论
Multiparty DSA signature generation without simultaneous user operations
收藏 引用
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 2004年 第8期E87D卷 2095-2105页
作者: Sameshima, Y Saisho, H Oyanagi, K Matsumoto, T Hitachi Software Engn Co Ltd R&D Tokyo 1400002 Japan Inst Informat Secur Yokohama Kanagawa 2210835 Japan Yokohama Natl Univ Grad Sch Environm & Informat Sci Yokohama Kanagawa 2408501 Japan
The authors present a multiparty signature generation (MSG) scheme of the digital signature algorithm (FIPS 186-1). The scheme is based on a simple idea, however, it is much more convenient in usability in the real wo... 详细信息
来源: 评论
Efficient sub-band coding in JPEG2000 for improved authentication and tamper-proofing
收藏 引用
The Journal of Photographic Science 2004年 第3期52卷 181-187页
The LL sub-band from the discrete wavelet transform in JPEG2000 is similar to a smaller image of the original in spatial domain. The proposed authentication and tamperproofing scheme is to extract and hide the entire ... 详细信息
来源: 评论