咨询与建议

限定检索结果

文献类型

  • 20 篇 期刊文献
  • 19 篇 会议

馆藏范围

  • 39 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 35 篇 工学
    • 24 篇 计算机科学与技术...
    • 11 篇 信息与通信工程
    • 10 篇 电气工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 机械工程
    • 2 篇 软件工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 控制科学与工程
    • 1 篇 交通运输工程
  • 7 篇 理学
    • 7 篇 数学
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 艺术学
    • 1 篇 美术学

主题

  • 39 篇 digital signatur...
  • 4 篇 elliptic curve c...
  • 4 篇 elliptic curve d...
  • 4 篇 digital signatur...
  • 4 篇 cryptography
  • 3 篇 lll algorithm
  • 3 篇 public key crypt...
  • 3 篇 authentication
  • 3 篇 rsa
  • 3 篇 public key
  • 2 篇 falcon
  • 2 篇 intrusion detect...
  • 2 篇 special characte...
  • 2 篇 jpeg2000
  • 2 篇 discrete logarit...
  • 2 篇 babai's nearest ...
  • 2 篇 distortion reduc...
  • 2 篇 crystals-dilithi...
  • 2 篇 post-quantum cry...
  • 2 篇 dsa

机构

  • 4 篇 aristotle univ t...
  • 3 篇 kookmin univ dep...
  • 1 篇 anhui univ inst ...
  • 1 篇 elect & telecomm...
  • 1 篇 inst informat in...
  • 1 篇 tunghai univ dep...
  • 1 篇 peoples secur ac...
  • 1 篇 anna univ ceg de...
  • 1 篇 jeppiaar engn co...
  • 1 篇 univ s florida d...
  • 1 篇 anna univ dept i...
  • 1 篇 univ missouri de...
  • 1 篇 inst informat se...
  • 1 篇 bml munjal univ ...
  • 1 篇 yeungnam univ de...
  • 1 篇 ho chi minh city...
  • 1 篇 chinese univ hon...
  • 1 篇 siddaganga inst ...
  • 1 篇 univ sci & techn...
  • 1 篇 vietnam natl uni...

作者

  • 4 篇 poulakis dimitri...
  • 3 篇 seo seog chung
  • 2 篇 draziotis konsta...
  • 2 篇 adamoudis marios
  • 1 篇 xue-tao zhang
  • 1 篇 tu phan
  • 1 篇 guo-juan song
  • 1 篇 oyanagi k
  • 1 篇 choi junhyeok
  • 1 篇 bose s.
  • 1 篇 park jong-yeon
  • 1 篇 jung heon hui
  • 1 篇 shaji r. s.
  • 1 篇 al-absi ahmed ab...
  • 1 篇 shiny r.
  • 1 篇 oh hyunyoung
  • 1 篇 shin donghyun
  • 1 篇 poulakis d.
  • 1 篇 chow sherman s. ...
  • 1 篇 chen ts

语言

  • 38 篇 英文
  • 1 篇 其他
检索条件"主题词=Digital signature algorithm"
39 条 记 录,以下是11-20 订阅
排序:
Design and Implementation of Electronic Document Signing and Depositing System Based on Blockchain  24
Design and Implementation of Electronic Document Signing and...
收藏 引用
3rd International Conference on Cryptography, Network Security and Communication Technology (CNSCT)
作者: Ji, Quan Wu, Zhongcheng Xie, Liyang Li, Yong Zhang, Jun Anhui Univ Inst Phys Sci & Informat Technol Hefei Anhui Peoples R China Chinese Acad Sci HFIPS High Field Magnet Lab Hefei 230031 Peoples R China High Magnet Field Lab Anhui Prov Hefei 230031 Peoples R China Univ Sci & Technol China Hefei 230031 Peoples R China
To prevent tampering with documents before they are deposited into the blockchain, a system called Sign Storage Evidence Chain (SSEChain) has been designed and implemented. SSEChain is a blockchain-based electronic do... 详细信息
来源: 评论
A Secured Storage and Communication System for Cloud Using ECC, Polynomial Congruence and DSA
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2022年 第2期126卷 949-974页
作者: Nithisha, J. Jayarin, P. Jesu Jeppiaar Engn Coll Dept Comp Sci & Engn Chennai Tamil Nadu India
Security is necessary for performing the effective data communications in internet and cloud environment. The data security in cloud is becoming very challenging task due to the presence of huge volume of cloud users.... 详细信息
来源: 评论
How (Not) to Build Threshold EdDSA  23
How (Not) to Build Threshold EdDSA
收藏 引用
26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
作者: Wong, Harry W. H. Ma, Jack P. K. Yin, Hoover H. F. Chow, Sherman S. M. Chinese Univ Hong Kong Dept Informat Engn Shatin Hong Kong Peoples R China
Edwards-curve digital signature algorithm (EdDSA) is a highly efficient scheme with a short key size. It is derived from the threshold-friendly Schnorr signatures and is covered by the NIST standardization efforts of ... 详细信息
来源: 评论
Attacking (EC)DSA with partially known multiples of nonces
收藏 引用
INFORMATION AND COMPUTATION 2024年 第PartB期301卷
作者: Adamoudis, Marios Draziotis, Konstantinos A. Poulakis, Dimitrios Aristotle Univ Thessaloniki Dept Math Thessaloniki 54124 Greece Aristotle Univ Thessaloniki Dept Informat GR-54124 Thessaloniki Greece
In this paper, we introduce a series of attacks on DSA schemes that, under certain assumptions, can expose the secret key when one or more signed messages are accessible. By utilizing these signed messages, we constru... 详细信息
来源: 评论
Efficient and Side-Channel Resistant Design of High-Security Ed448 on ARM Cortex-M4
Efficient and Side-Channel Resistant Design of High-Security...
收藏 引用
IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
作者: Anastasova, Mila Bisheh-Niasar, Mojtaba Seo, Hwajeong Azarderakhsh, Reza Kermani, Mehran Mozaffari Florida Atlantic Univ Dept Comp & Elect Engn & Comp Sci Boca Raton FL 33431 USA Florida Atlantic Univ I SENSE Boca Raton FL 33431 USA Hansung Univ Div IT Convergence Engn Seoul 136792 South Korea Univ S Florida Dept Comp Engn & Sci Tampa FL 33620 USA
The demand for classical cryptography schemes continues to increase due to the exhaustive studies on their security. Thus, constant improvement of liming, power consumption, and memory requirements are needed for the ... 详细信息
来源: 评论
Attacking (EC)DSA scheme with ephemeral keys sharing specific bits
收藏 引用
THEORETICAL COMPUTER SCIENCE 2024年 1001卷
作者: Adamoudis, M. Draziotis, K. A. Poulakis, D. Aristotle Univ Thessaloniki Dept Math Thessaloniki 54124 Greece Aristotle Univ Thessaloniki Dept Informat Thessaloniki 54124 Greece
In this paper, we present a deterministic attack on (EC)DSA signature scheme, providing that several signatures are known such that the corresponding ephemeral keys share a certain amount of bits without knowing their... 详细信息
来源: 评论
The optimization of elliptic curve digital signature algorithm based on hyperchaotic
The optimization of elliptic curve digital signature algorit...
收藏 引用
2013 3rd International Conference on Advanced Materials and Information Technology Processing (AMITP 2013)
作者: Zuo-Peng Zhao Pei Li Guo-Juan Song Yuan-Yuan Zong Xue-Tao Zhang Qing-Hua Kang College of Computer Science and Technology China University of Mining and Technology College of Information and Electrical Engineering China University of Mining and Technology
This paper presents a digital signature algorithm(T-(HC&ECDSA)).With the purpose to improve performance and security,respectively,elliptic curve digital signature algorithm(ECDSA) is improved by introducing two-di... 详细信息
来源: 评论
Cryptography Survey of DSS and DSA
Cryptography Survey of DSS and DSA
收藏 引用
International Conference on Advances in Materials and Manufacturing Engineering (ICAMME)
作者: Al-Absi, Mohammed Abdulhakim Abdullaev, Azamjon Al-Absi, Ahmed Abdulhakim Sain, Mangal Lee, Hoon Jae Dongseo Univ Div Informat & Commun Engn 47 Jurye Ro Busan 47011 South Korea Kyungdong Univ Dept Smart Comp 46 4-Gil Gosung 24764 Gangwon Do South Korea
digital signatures are the basis for identifying who sends file identities in modern society today. digital signatures are a way to provide integrity and reliability for digital data signatures. signatures use a set o... 详细信息
来源: 评论
Enhancing an Attack to DSA Schemes  8th
Enhancing an Attack to DSA Schemes
收藏 引用
8th International Conference on Algebraic Informatics (CAI)
作者: Adamoudis, Marios Draziotis, Konstantinos A. Poulakis, Dimitrios Aristotle Univ Thessaloniki Dept Math Thessaloniki Greece Aristotle Univ Thessaloniki Dept Informat Thessaloniki Greece
In this paper, we improve the theoretical background of the attacks on the DSA schemes of a previous paper, and we present some new more practical attacks.
来源: 评论
DNACK: False Data Detection Based on Negative Acknowledgment and digital signature on Mobile Ad-hoc Network
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2015年 第1期83卷 1-15页
作者: Abarghouei, Babak Emami Farokhtala, Ali Alizadeh, Mojtaba Mem Univ Newfoundland St John NF Canada UTM Malaysian Japan Int Inst Technol Kuala Lumpur 54100 Malaysia
Mobile ad-hoc network is an interesting network, which is classified as an autonomous system. These types of networks are constructed based on low capacity wireless links, without having a centralized infrastructure s... 详细信息
来源: 评论