• No results found

ElGamal digital signature

Defend Data using ELGAMAL Digital Signature          Data Decryption Algorithm

Defend Data using ELGAMAL Digital Signature Data Decryption Algorithm

... different digital signature (γ ,λ,δ ) for the different random number k, ...of signature and improved security. When signers take λ as a signature, they need to finish one more computing power ...

6

A Digital Signature Scheme Based on Pell Equation

A Digital Signature Scheme Based on Pell Equation

... 1985, ElGamal [6] proposed a public key cryptosystem and a digital signature scheme based on the difficulty of solving the Discrete Logarithm Problem in the multiplicative group of an appropriate ...

5

Combining Public Key Encryption with Schnorr Digital Signature

Combining Public Key Encryption with Schnorr Digital Signature

... Schnorr digital signature ...on ElGamal digital signature and discusses the practical applications of Signcryp- tion in real ...Schnorr digital signature in order to ...

7

Security Analysis of Digital Signature Scheme with Message Recovery using Self-Certified Public Keys

Security Analysis of Digital Signature Scheme with Message Recovery using Self-Certified Public Keys

... Digital signature plays a key role in modern cryptographic ...also digital signature brings non-repudiation with it. Like ElGamal digital signature scheme [2], the basic ...

13

ECC-Based  Non-Interactive  Deniable  Authentication  with  Designated  Verifier

ECC-Based Non-Interactive Deniable Authentication with Designated Verifier

... concurrent zero-knowledge proof. Their study permits a sender (S) to authenticate a message m for a receiver (R), but a third party cannot verify the authentication. In other words, it does not permit R to convince a ...

21

Secure Proxy Digital Signature Scheme using Digital Signature Standard with Random Key Generation Process

Secure Proxy Digital Signature Scheme using Digital Signature Standard with Random Key Generation Process

... days digital signature schemes stress on secure, authentication and verification mechanism of electronic signature used in electronic transaction ...proxy digital signature may play an ...

6

An Electronic Public Engineering Project Bidding Protocol via a Subliminal Channel

An Electronic Public Engineering Project Bidding Protocol via a Subliminal Channel

... the electronic auction properties of anonymity, secu- rity, privacy, atomicity and low overhead cost, but also adds the properties of non-repudiation, untraceabil- ity, auditablity, one-time registration and unlinkabil- ...

14

AN EFFECTIVE MIXED MEDIA TRANSMITTER UTILIZING MULTIPROCESSING METHODOLOGY WITH SERVER AND CLIENT CORRESPONDENCE ON CONTINUOUS OPERATIONS

AN EFFECTIVE MIXED MEDIA TRANSMITTER UTILIZING MULTIPROCESSING METHODOLOGY WITH SERVER AND CLIENT CORRESPONDENCE ON CONTINUOUS OPERATIONS

... a signature for each packet with its private key, which is called signing, and each receiver checks the validity of the signature with the sender’s public key, which is called ...implemented digital ...

8

Digital Signature Scheme for Image

Digital Signature Scheme for Image

... authentication. Signature based methods can work on both the integrity protection of the image and repudiation prevention of the ...a digital signature is that the embedding process of the former ...

6

Hybrid encryption for digital signature

Hybrid encryption for digital signature

... Digital signature is used to verify the receiver that the sender are sending the file to the receiver, not someone who try to impersonate and modify the ...A digital certificate that is valid will ...

24

Electronic Certificates in E-Learning System

Electronic Certificates in E-Learning System

... 3. Hash functions take an arbitrarily long piece of plaintext and compute a fixed length hash value. Computing a message digest from a piece of plain text is much faster than encryption of same text, with the asymmetric ...

6

RESOLUTENESS OF DIGITAL SIGNATURE: ISSUES AND CHALLENGES.

RESOLUTENESS OF DIGITAL SIGNATURE: ISSUES AND CHALLENGES.

... nothing; Digital signature will come into their own through use by ...their signature to the bottom of ...their digital signature in electronic document then in this case the court will ...

7

Implementation of Secure Hash Algorithm1 for High Throughput and Optimized Performance

Implementation of Secure Hash Algorithm1 for High Throughput and Optimized Performance

... The Secure Hash Algorithm-1 popularly known as SHA-1 is a cryptographic hash algorithm. This is one of the four algorithms in SHA family. This algorithm was developed by US National Security Agency (NSA) and published by ...

10

Improved Protection Measures in WEP/WPA/WPA2-PSK using Random Bitwise Signatures

Improved Protection Measures in WEP/WPA/WPA2-PSK using Random Bitwise Signatures

... C. Hash Function:-The hash function plays an important role in modern cryptography. A Cryptographic hash function is a hash function, that is, an algorithm that takes an arbitrary block of data & returns a fixed-size ...

8

Introduction to Cryptography   Principles & Applications, 2nd Ed  pdf

Introduction to Cryptography Principles & Applications, 2nd Ed pdf

... Creation of Certificates. If Alice wants to get a certificate, she goes to a certification authority C. To prove her identity, Alice shows her passport. Now, Alice needs public- and private-key pairs for encryption and ...

372

An approach on various Digital Signature Algorithms

An approach on various Digital Signature Algorithms

... Abstract: Due to rapid increase of electronic communication. It becomes necessary to secure the transmission through digital signature. This paper examines different algorithms for generation of ...

8

Use Digital Signature in E Commerce

Use Digital Signature in E Commerce

... Every day, people sign their names to letters, credit card receipts, and other documents, demonstrating they are in agreement with the contents. That is, they authenticate that they are in fact the sender or originator ...

10

AN  ATTACK  ON  THE  WALNUT  DIGITAL  SIGNATURE  ALGORITHM

AN ATTACK ON THE WALNUT DIGITAL SIGNATURE ALGORITHM

... WalnutDSA is a digital signature algorithm recently proposed by I. An- shel, D. Atkins, D. Goldfeld, and P. Gunnels in [4]. It has been accepted by the National Institute of Standards and Technology for ...

19

Conventional and Improved Digital Signature Scheme: A Comparative Study

Conventional and Improved Digital Signature Scheme: A Comparative Study

... the digital signa- ture is generated by taken plain text ...generated signature to the intended recipient. Signature verification algorithm is executed at recipient end to ensure the received data ...

10

A New secure email scheme Using Digital Signature with S/MIME

A New secure email scheme Using Digital Signature with S/MIME

... Digital signature schemes allow a signer S who has established a public key pk to “sign" a message in such a way that any other part y who knows pk (and knows that this public key was established by S) ...

7

Show all 10000 documents...

Related subjects