intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

The Digital Signatures

Xem 1-20 trên 96 kết quả The Digital Signatures
  • In this paper, the authors propose a solution to improve the secure of digital signature schemes, this solution is implemented on two levels of digital signature scheme construction. At the second level, the authors propose a method to construct new digital signature algorithms based on this hard problem.

    pdf10p vigojek 02-02-2024 0 0   Download

  • This paper presents a lightweight digital signature-based routing message and node authentication solution for wireless multimedia sensor networks (WMSNs). The lightweight geographical security routing protocol (ECDSA-TPGF) is proposed on the basis of improving the original two-phase greedy geographical forwarding protocol (TPGF), in which we have added the solution Elliptic curve cryptography (ECC) and cyclic redundancy check (CRC) to create a digital signature for a sensor node attached to a routing message.

    pdf8p vimarillynhewson 02-01-2024 6 3   Download

  • Doing the actual math behind modern encryption is admittedly quite difficult, but using the tools that do the work for you isn’t difficult at all once you have a rudimentary understanding of when to use which sort of encryption. PGP & GPG: Email for the Practical Paranoid will take you step by step through the world of encryption and digital signatures and teach you how to use the tools that will allow you to protect your confidential information while sharing it as you desire.

    pdf216p haojiubujain06 23-10-2023 4 3   Download

  • Continued part 1, part 2 of ebook "A graduate course in applied cryptography" develops the concepts of public-key encryption and digital signatures, which allow Alice and Bob to communicate securely, without having a pre-shared secret key. About cryptographic protocols, such as protocols for user identification, key exchange, zero knowledge, and secure computation.

    pdf489p tieulangtran 28-09-2023 4 3   Download

  • Ebook Computer security and cryptography part 2 includes contents: Chapter 9 block-ciphers: lucifer, DES, and AES; chapter 10 the paradigm of public key cryptography; chapter 11 the knapsack cryptosystem; chapter 12 the rsa cryptosystem; chapter 13 prime numbers and factorization; chapter 14 the discrete logarithm problem; chapter 15 elliptic curve cryptography; chapter 16 key exchange in a network; chapter 17 digital signatures and authentication; chapter 18 applications of cryptography; chapter 19 cryptographic patents.

    pdf239p haojiubujain06 05-09-2023 6 2   Download

  • Ebook Hack proofing XML - The only way to stop a hacker is to think like one: Part 1 includes contents: Chapter 1 The zen of hack proofing, Chapter 2 Classes of attack, Chapter 3 Reviewing the fundamentals of XML, Chapter 4 Document type: The validation gateway, Chapter 5 XML digital signatures.

    pdf205p haojiubujain06 05-09-2023 2 2   Download

  • Schnorr signature schemas and the version on its elliptic curve (EC-Schnorr) are signature schemas that are not only highly secure but are also rated as having the highest performance among signature schemas based on discrete logarithm problems (on the Fp finite field and on the elliptic curve).

    pdf16p viargus 20-02-2023 2 1   Download

  • In this article, the authors propose a solution to improve the security of digital signature schemes, implemented in both levels of digital signatures. At the first level, the authors propose a new hard problem - different from the hard problems used before and hasn’t been solved by anyone so far (except by "brute force attack" method).

    pdf11p viargus 20-02-2023 1 1   Download

  • The article proposes a method to build a signature scheme based on a new hard problem, called the logarithm problem with roots on the finite field Fp. Now, this is a hard problem belonging to the class of unsolvable problems, except for the “brute force” method.

    pdf7p visirius 19-01-2023 9 3   Download

  • In this paper, we propose a design method for the signature scheme based on ring structure Zn. Our signature schemes are more secure, generate signatures at a faster rate than that of the ElGamal scheme and its variants. Moreover, our approaches also overcome some disadvantages of some similar signature schemes on ring Zn. For these advantages, they are fully applicable in practice.

    pdf10p viwmotors 02-12-2022 17 3   Download

  • Advanced Computer Networks: Lecture 41. This lecture will cover the following: message integrity protocols; digital signature using RSA; session key communication; key distribution center; man-in-the-middle attack in Diffie-Hellman; tree-structured CA hierarchy; PGP message integrity and authentication;...

    ppt31p haoasakura 30-05-2022 17 3   Download

  • Lecture Cryptography and network security: Chapter 13 after studying this section will help you understand: To define a digital signature; To define security services provided by a digital signature; To define attacks on digital signatures; To discuss some digital signature schemes, including RSA, ElGamal;...

    pdf36p hoathachthao090 10-02-2022 12 3   Download

  • Tissues are complex milieus consisting of numerous cell types. Several recent methods have attempted to enumerate cell subsets from transcriptomes. However, the available methods have used limited sources for training and give only a partial portrayal of the full cellular landscape. Here we present xCell, a novel gene signature-based method, and use it to infer 64 immune and stromal cell types.

    pdf14p vialfrednobel 29-01-2022 11 0   Download

  • The article presents a new construction method of digital signature algorithms based on difficulty of the discrete logarithm problem. From the proposed method, the different signature schemes can be deployed to choose suitably for applications in practice.

    pdf5p luuhongdung 09-09-2021 52 38   Download

  • This paper proposes a design method of digital signature scheme based on the difficulty of the discrete logarithm problem. With the proposed method, we can develop a lot of other digital signature schemes to choose suitable for practical applications.

    pdf5p luuhongdung 09-09-2021 54 39   Download

  • This paper presents the proposed method of building a digital signature algorithm which is based on the difficulty of solving root problem and some expanded root problems on Zp. The expanded root problem is a new form of difficult problem without the solution, also originally proposed and applied to build digital signature algorithms. This proposed method enable to build a high-security digital signature platform for practical applications.

    pdf6p luuhongdung 09-09-2021 61 41   Download

  • In this paper, with the target to improve safety level of digital signature algorithms, we present the proposed method for constructing digital signature algorithms which is based on a new key scheme. This new key format is constructed using a new difficulty problem without high-efficiency solution and it can be applied to construct digital signature algorithms. According to this research, a high-security digital signature class can be construct by the proposed method in some actual situation.

    pdf7p luuhongdung 09-09-2021 53 39   Download

  • This paper presents the proposed method of building a digital signature algorithm which is based on the difficulty of solving root problem and some expanded root problems on Zp. The expanded root problem is a new form of difficult problem without the solution, also originally proposed and applied to build digital signature algorithms. This proposed method enable to build a high-security digital signature platform for practical applications.

    pdf6p luuhongdung 07-09-2021 62 41   Download

  • The paper focuses on analyzing weaknesses which can be attacked reveals the origin of a message being signed by known blind digital scheme, which proposed a new scheme have higher degree of security in a sense of keeping secret the source of the signed message. It will meet the demand of the real.

    pdf10p luuhongdung 07-09-2021 59 42   Download

  • The paper proposes a method of constructing digital signature algorithms based on the new key schemes. The new key schemes are difficult problems that currently have no solution. That algorithm construction method with a new key scheme is to improve the security of digital signature algorithms. The new method is showed through the construction of two specific digital signature algorithms and the generation of highly secure signature algorithms that are constructed by this method is completely possible.

    pdf14p luuhongdung 07-09-2021 64 42   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2