digital signature
Implementation of elliptic curve digital signature algorithm
free download
ABSTRACT The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI standard, and was accepted in 2000 as IEEE and NIST standards. It was also accepted inDigital signatures have become a key technology for making the Internet and other IT- infrastructures secure. Digital signatures provide authenticity, integrity, and non-repudiation of data. Digital signatures are widely used in identification and authentication protocols Because of the increased cost-effectiveness of computer technology and its subsequent acceptance into the business world, computer-based message systems are likely to become the principal carriers of business correspondence. Unfortunately with the efficiency of these
Digital signature standard (DSS)
free download
This Standard specifies a suite of algorithms that can be used to generate a digital signature . Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital
Encoding a hidden digital signature onto an audio signal using psychoacoustic masking
free download
We report on the development of a system for use in an interactive television application. A method of encoding a hidden digital signature onto the audio component of a television signal is presented. This digital signature is about 35 bits in length and is encoded utilizing
Watermarking and digital signature techniques for multimedia authentication and copyright protection
free download
This thesis addresses two closely related problems {multimedia authentication and copyright protection. We also examine the important issue regarding the maximum amount of watermark information without causing noticeable perceptual degradation. The well-known
based document authentication using digital signature and QR code
free download
Department of Computer Science, Graduate School of Applied Statistics National Institute of Development Administration 118 Serithai Rd. Bangkapi, Bangkok 10240 Thailand Abstract There are still needs for paper-based documents in certain circumstances where electronic
On the elliptic curve digital signature algorithm
free download
In this thesis, we propose a variant of the ANSI X9. 62 ECDSA. We give a brief introduction to the digital signature algorithm in chapter and then give the basic concepts of the elliptic curve cryptosystems in chapter 3. The next chapter includes the elliptic curve version of
SOAP security extensions: Digital signature
free download
This document is a NOTE made available by the W3C for discussion only. Publication of this Note by the W3C indicates no endorsement by W3C or the W3C Team, or any W3C Members. The W3C has had no editorial control over the preparation of this Note. This document
Blind Signature Protocols from Digital Signature Standards.
free download
Using Russian digital signature (DS) standards as the underlying scheme there are designed the blind DS protocols that are the first known implementation of the blind DS based on signature standards. There are also proposed blind collective DS protocols based
Digital signature standard (DSS)
free download
This Standard specifies a suite of algorithms that can be used to generate a digital signature . Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital
A new digital signature scheme based on factoring and discrete logarithms
free download
Problem statement: A digital signature scheme allows one to sign an electronic message and later the produced signature can be validated by the owner of the message or by any verifier. Most of the existing digital signature schemes were developed based on a single
A novel secure hash algorithm for public key digital signature schemes.
free download
Hash functions are the most widespread among all cryptographic primitives, and are currently used in multiple cryptographic schemes and in security protocols. This paper presents a new Secure Hash Algorithm called (SHA-192). It uses a famous secure hash
Anti-tro and tro detection with in-kernel digital signature testing of executables
free download
This paper presents a somewhat compute expensive way to detect or deny the activity of Tro or otherwise modified executable files that have been tampered with in any way thus taking a that which is not expressly permitted is denied stance. It then provides a
A threshold digital signature issuing scheme without secret communication
free download
This paper describes an efficient (k, n) threshold digital signature scheme. In the scheme, k out of n signers cooperate to issue a signature without using trusted center. No secret communication is required among signers across the network. As a base scheme
A matricial public key cryptosystem with digital signature
free download
Dpt. of Computer Science and Artificial Intelligence University of Alicante Campus de San Vicente, Ap. Correos 9 03080 Alicante SPAIN {ralvarez 1 fmartine 2 jvicent 3 zamora 4 }@dccia.ua.es This research was partially supported by the Spanish grant GV06/018
Digital signature scheme based on a new hard problem
free download
NA Moldovyan- Computer Science Journal of Moldova ibn.idsi.md Factorizing composite number n= qr, where q and r are two large primes, and finding discrete logarithm modulo large prime number p are two difficult computational problems which are usually put into the base of different digital signature schemes (DSSes). This
WalnutDSATM: a quantum-resistant digital signature algorithm
free download
In 2005 I. Anshel, M. Anshel, D. Goldfeld, and S. Lemieux introduced E-MultiplicationTM, a quantum-resistant, group-theoretic, one-way function which can be used as a basis for many different cryptographic applications. To date, all analysis and attacks on E-Multiplication
A new digital signature scheme based on mandelbrot and julia fractal sets
free download
This paper describes a new cryptographic digital signature scheme based on Mandelbrot and Julia fractal sets. Having fractal based digital signature scheme is possible due to the strong connection between the Mandelbrot and Julia fractal sets. The link between the two
Digital signature and watermark methods for image authentication using cryptography analysis
free download
The digital signature and watermarking methods are used for image authentication. Digital signature encodes the signature in a file separate from the original image. Cryptographic algorithms have suggested several advantages over the traditional encryption algorithms CSE PROJECTS