咨询与建议

限定检索结果

文献类型

  • 20 篇 期刊文献
  • 19 篇 会议

馆藏范围

  • 39 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 35 篇 工学
    • 24 篇 计算机科学与技术...
    • 11 篇 信息与通信工程
    • 10 篇 电气工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 机械工程
    • 2 篇 软件工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 控制科学与工程
    • 1 篇 交通运输工程
  • 7 篇 理学
    • 7 篇 数学
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 艺术学
    • 1 篇 美术学

主题

  • 39 篇 digital signatur...
  • 4 篇 elliptic curve c...
  • 4 篇 elliptic curve d...
  • 4 篇 digital signatur...
  • 4 篇 cryptography
  • 3 篇 lll algorithm
  • 3 篇 public key crypt...
  • 3 篇 authentication
  • 3 篇 rsa
  • 3 篇 public key
  • 2 篇 falcon
  • 2 篇 intrusion detect...
  • 2 篇 special characte...
  • 2 篇 jpeg2000
  • 2 篇 discrete logarit...
  • 2 篇 babai's nearest ...
  • 2 篇 distortion reduc...
  • 2 篇 crystals-dilithi...
  • 2 篇 post-quantum cry...
  • 2 篇 dsa

机构

  • 4 篇 aristotle univ t...
  • 3 篇 kookmin univ dep...
  • 1 篇 anhui univ inst ...
  • 1 篇 elect & telecomm...
  • 1 篇 inst informat in...
  • 1 篇 tunghai univ dep...
  • 1 篇 peoples secur ac...
  • 1 篇 anna univ ceg de...
  • 1 篇 jeppiaar engn co...
  • 1 篇 univ s florida d...
  • 1 篇 anna univ dept i...
  • 1 篇 univ missouri de...
  • 1 篇 inst informat se...
  • 1 篇 bml munjal univ ...
  • 1 篇 yeungnam univ de...
  • 1 篇 ho chi minh city...
  • 1 篇 chinese univ hon...
  • 1 篇 siddaganga inst ...
  • 1 篇 univ sci & techn...
  • 1 篇 vietnam natl uni...

作者

  • 4 篇 poulakis dimitri...
  • 3 篇 seo seog chung
  • 2 篇 draziotis konsta...
  • 2 篇 adamoudis marios
  • 1 篇 xue-tao zhang
  • 1 篇 tu phan
  • 1 篇 guo-juan song
  • 1 篇 oyanagi k
  • 1 篇 choi junhyeok
  • 1 篇 bose s.
  • 1 篇 park jong-yeon
  • 1 篇 jung heon hui
  • 1 篇 shaji r. s.
  • 1 篇 al-absi ahmed ab...
  • 1 篇 shiny r.
  • 1 篇 oh hyunyoung
  • 1 篇 shin donghyun
  • 1 篇 poulakis d.
  • 1 篇 chow sherman s. ...
  • 1 篇 chen ts

语言

  • 38 篇 英文
  • 1 篇 其他
检索条件"主题词=Digital signature algorithm"
39 条 记 录,以下是11-20 订阅
排序:
DNACK: False Data Detection Based on Negative Acknowledgment and digital signature on Mobile Ad-hoc Network
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2015年 第1期83卷 1-15页
作者: Abarghouei, Babak Emami Farokhtala, Ali Alizadeh, Mojtaba Mem Univ Newfoundland St John NF Canada UTM Malaysian Japan Int Inst Technol Kuala Lumpur 54100 Malaysia
Mobile ad-hoc network is an interesting network, which is classified as an autonomous system. These types of networks are constructed based on low capacity wireless links, without having a centralized infrastructure s... 详细信息
来源: 评论
A Hierarchical Deterministic Wallet Using Ed25519 digital signature Scheme  9th
A Hierarchical Deterministic Wallet Using Ed25519 Digital Si...
收藏 引用
9th International Conference, FDSE
作者: Thang Nguyen-Dinh Phuong Nguyen-Nguyen Tu Phan Khuong Nguyen-An Ho Chi Minh City Univ Technol Fac Comp Sci & Engn 268 Ly Thuong Kiet StDist 10 Ho Chi Minh City Vietnam Vietnam Natl Univ Ho Chi Minh City Linh Trung Ward Ho Chi Minh City Vietnam Descartes Network Ho Chi Minh City Vietnam
On the Internet, most financial applications apply public key cryptography to verify users' identities, manage their digital assets, authenticate and authorize them, etc. In a blockchain system, this model is cruc... 详细信息
来源: 评论
Design of Hyper Elliptic Curve digital signature
Design of Hyper Elliptic Curve Digital Signature
收藏 引用
International Conference on Information Technology and Computer Science
作者: Deng Jian-zhi Cheng Xiao-hui Gui Qiong Guilin Univ Technol Dept Elect & Comp Sci Guilin Peoples R China
In computer cryptography, Hyper elliptic curve cryptography system is one of the best cryptography system. DSA signature algorithm is also an advanced digital signature algorithm. In this paper, it's banded hyper ... 详细信息
来源: 评论
Some lattice attacks on DSA and ECDSA
收藏 引用
APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING 2011年 第5-6期22卷 347-358页
作者: Poulakis, Dimitrios Aristotle Univ Thessaloniki Dept Math Thessaloniki 54124 Greece
In this paper, using the LLL reduction method and computing the integral points of two classes of conics, we develop attacks on DSA and ECDSA in case where the secret and the ephemeral key of a signed message or their... 详细信息
来源: 评论
A SECURE CONFERENCE KEY PROTOCOL OVER ECC-BASED GREY SYSTEMS
收藏 引用
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL 2011年 第10期7卷 5717-5730页
作者: Chen, Tzer-Long Chung, Yu-Fang Lin, Frank Y. S. Natl Taiwan Univ Dept Informat Management Taipei 10617 Taiwan Tunghai Univ Dept Elect Engn Taichung 40704 Taiwan
In the current environment, there are only a limited number of third-parties that general users can trust in terms of authentication and verification. Often, the self-acclaimed independent third-parties are the partie... 详细信息
来源: 评论
A Secured Storage and Communication System for Cloud Using ECC, Polynomial Congruence and DSA
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2022年 第2期126卷 949-974页
作者: Nithisha, J. Jayarin, P. Jesu Jeppiaar Engn Coll Dept Comp Sci & Engn Chennai Tamil Nadu India
Security is necessary for performing the effective data communications in internet and cloud environment. The data security in cloud is becoming very challenging task due to the presence of huge volume of cloud users.... 详细信息
来源: 评论
An Efficient Hardware/Software Co-Design for FALCON on Low-End Embedded Systems
收藏 引用
IEEE ACCESS 2024年 12卷 57947-57958页
作者: Lee, Yongseok Youn, Jonghee Nam, Kevin Jung, Heon Hui Cho, Myunghyun Na, Jimyung Park, Jong-Yeon Jeon, Seungsu Kang, Bo Gyeong Oh, Hyunyoung Paek, Yunheung Seoul Natl Univ Dept Elect & Comp Engn Seoul 08826 South Korea Seoul Natl Univ Interuniv Semicond Res Ctr Seoul 08826 South Korea Yeungnam Univ Dept Comp Engn Gyongsan 38541 South Korea Samsung Elect Syst LSI Hwaseong Si 16677 Gyeonggi Do South Korea Gachon Univ Dept AI Software Seongnam Si 13120 Gyeonggi Do South Korea
We propose in this paper an efficient FALCON accelerator called EFX based on a HW/SW co-design where FALCON is a post-quantum cryptographic (PQC) scheme tailored as a digital signature algorithm (DSA). Our findings re... 详细信息
来源: 评论
Strong Diffie-Hellman-DSA key exchange
收藏 引用
IEEE COMMUNICATIONS LETTERS 2007年 第5期11卷 432-433页
作者: Jeong, Ik Rae Kwon, Jeong Ok Lee, Dong Hoon Elect & Telecommun Res Inst ETRI Taejon 305606 South Korea Korea Univ CIST Grad Sch Informat Secur Seoul 136701 South Korea
To provide authentication to the Diffie-Hellman key exchange, a few integrated key exchange schemes which provide authentication using the DSA signature have been proposed in the literature. In this letter we point ou... 详细信息
来源: 评论
Improved DSA variant for batch verification
收藏 引用
APPLIED MATHEMATICS AND COMPUTATION 2005年 第1期169卷 75-81页
作者: Lin, CH Hsu, RH Harn, L Tunghai Univ Dept Comp Sci & Informat Engn Taichung 407 Taiwan Univ Missouri Dept Comp Networking Kansas City MO 64110 USA
Batch verification is a method to verify multiple signatures at once. There are two issues associated with batch verification. One is the security problem and the other is the computational speed. In 1998, Bellare et ... 详细信息
来源: 评论
Parallel implementation of CRYSTALS-Dilithium for effective signing and verification in autonomous driving environment
收藏 引用
ICT EXPRESS 2023年 第1期9卷 100-105页
作者: Seo, Seog Chung An, SangWoo Kookmin Univ Dept Financial Informat Secur Seoul South Korea Telecommun Technol Assoc TTA Seongnam Gyeonggi Do South Korea
In the autonomous driving environment, each vehicle performs numerous signing and verification while sending and receiving BSMs (Basic Security Messages) in real-time. We present an optimized CRYSTALS-Dilithium softwa... 详细信息
来源: 评论