digital signature


COMPUTER COURSE ONLINE

Implementation of elliptic curve digital signature algorithm
free download

ABSTRACT The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI standard, and was accepted in 2000 as IEEE and NIST standards. It was also accepted inDigital signatures have become a key technology for making the Internet and other IT- infrastructures secure. Digital signatures provide authenticity, integrity, and non-repudiation of data. Digital signatures are widely used in identification and authentication protocols Because of the increased cost-effectiveness of computer technology and its subsequent acceptance into the business world, computer-based message systems are likely to become the principal carriers of business correspondence. Unfortunately with the efficiency of these

Digital signature standard (DSS)
free download

This Standard specifies a suite of algorithms that can be used to generate a digital signature . Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital

Encoding a hidden digital signature onto an audio signal using psychoacoustic masking
free download

We report on the development of a system for use in an interactive television application. A method of encoding a hidden digital signature onto the audio component of a television signal is presented. This digital signature is about 35 bits in length and is encoded utilizing

Watermarking and digital signature techniques for multimedia authentication and copyright protection
free download

This thesis addresses two closely related problems {multimedia authentication and copyright protection. We also examine the important issue regarding the maximum amount of watermark information without causing noticeable perceptual degradation. The well-known

based document authentication using digital signature and QR code
free download

Department of Computer Science, Graduate School of Applied Statistics National Institute of Development Administration 118 Serithai Rd. Bangkapi, Bangkok 10240 Thailand Abstract There are still needs for paper-based documents in certain circumstances where electronic

On the elliptic curve digital signature algorithm
free download

In this thesis, we propose a variant of the ANSI X9. 62 ECDSA. We give a brief introduction to the digital signature algorithm in chapter and then give the basic concepts of the elliptic curve cryptosystems in chapter 3. The next chapter includes the elliptic curve version of

SOAP security extensions: Digital signature
free download

This document is a NOTE made available by the W3C for discussion only. Publication of this Note by the W3C indicates no endorsement by W3C or the W3C Team, or any W3C Members. The W3C has had no editorial control over the preparation of this Note. This document

Blind Signature Protocols from Digital Signature Standards.
free download

Using Russian digital signature (DS) standards as the underlying scheme there are designed the blind DS protocols that are the first known implementation of the blind DS based on signature standards. There are also proposed blind collective DS protocols based

Digital signature standard (DSS)
free download

This Standard specifies a suite of algorithms that can be used to generate a digital signature . Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital

A new digital signature scheme based on factoring and discrete logarithms
free download

Problem statement: A digital signature scheme allows one to sign an electronic message and later the produced signature can be validated by the owner of the message or by any verifier. Most of the existing digital signature schemes were developed based on a single

A novel secure hash algorithm for public key digital signature schemes.
free download

Hash functions are the most widespread among all cryptographic primitives, and are currently used in multiple cryptographic schemes and in security protocols. This paper presents a new Secure Hash Algorithm called (SHA-192). It uses a famous secure hash

Anti-tro and tro detection with in-kernel digital signature testing of executables
free download

This paper presents a somewhat compute expensive way to detect or deny the activity of Tro or otherwise modified executable files that have been tampered with in any way thus taking a that which is not expressly permitted is denied stance. It then provides a

A threshold digital signature issuing scheme without secret communication
free download

This paper describes an efficient (k, n) threshold digital signature scheme. In the scheme, k out of n signers cooperate to issue a signature without using trusted center. No secret communication is required among signers across the network. As a base scheme

A matricial public key cryptosystem with digital signature
free download

Dpt. of Computer Science and Artificial Intelligence University of Alicante Campus de San Vicente, Ap. Correos 9 03080 Alicante SPAIN {ralvarez 1 fmartine 2 jvicent 3 zamora 4 }@dccia.ua.es This research was partially supported by the Spanish grant GV06/018

Digital signature scheme based on a new hard problem
free download

NA Moldovyan- Computer Science Journal of Moldova ibn.idsi.md Factorizing composite number n= qr, where q and r are two large primes, and finding discrete logarithm modulo large prime number p are two difficult computational problems which are usually put into the base of different digital signature schemes (DSSes). This

WalnutDSATM: a quantum-resistant digital signature algorithm
free download

In 2005 I. Anshel, M. Anshel, D. Goldfeld, and S. Lemieux introduced E-MultiplicationTM, a quantum-resistant, group-theoretic, one-way function which can be used as a basis for many different cryptographic applications. To date, all analysis and attacks on E-Multiplication

A new digital signature scheme based on mandelbrot and julia fractal sets
free download

This paper describes a new cryptographic digital signature scheme based on Mandelbrot and Julia fractal sets. Having fractal based digital signature scheme is possible due to the strong connection between the Mandelbrot and Julia fractal sets. The link between the two

Digital signature and watermark methods for image authentication using cryptography analysis
free download

The digital signature and watermarking methods are used for image authentication. Digital signature encodes the signature in a file separate from the original image. Cryptographic algorithms have suggested several advantages over the traditional encryption algorithms CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER

IEEE PAPER UNITED STATES