free -digital signature





Digital signature scheme based on a new hard problem
free download

NA Moldovyan- Computer Science Journal of Moldova ibn.idsi.md Factorizing composite number n= qr, where q and r are two large primes, and finding discrete logarithm modulo large prime number p are two difficult computational problems which are usually put into the base of different digital signature schemes (DSSes). This

WalnutDSATM: a quantum-resistant digital signature algorithm
free download

In 2005 I. Anshel, M. Anshel, D. Goldfeld, and S. Lemieux introduced E-MultiplicationTM, a quantum-resistant, group-theoretic, one-way function which can be used as a basis for many different cryptographic applications. To date, all analysis and attacks on E-Multiplication

A new digital signature scheme based on mandelbrot and julia fractal sets
free download

This paper describes a new cryptographic digital signature scheme based on Mandelbrot and Julia fractal sets. Having fractal based digital signature scheme is possible due to the strong connection between the Mandelbrot and Julia fractal sets. The link between the two

Digital signature and watermark methods for image authentication using cryptography analysis
free download

The digital signature and watermarking methods are used for image authentication. Digital signature encodes the signature in a file separate from the original image. Cryptographic algorithms have suggested several advantages over the traditional encryption algorithms

A comparative study of rsa based digital signature algorithms
free download

In 1978 the powerful and practical RSA public-key scheme was produced. It is the most widely used public-key cryptosystem. Its security is based on the intractability of the integer factorization problem and on solving the RSA problem of nding the eth¡ root of an integer cAbstract Schnorrs preprocessing algorithms [ 7] are designed to speed up the random exponentiation often performed by the prover/signer in identification and signature schemes. In this paper, an attack on these preprocessing algorithms is presented. For the proposed

Elliptic curve digital signature algorithm using boolean permutation based ECC
free download

The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA), where it is a digital signature scheme designed to provide a digital signature based on a secret number known only to the signer and also on the actual

Cryptanalysis of the batch verifying multiple DSA-type digital signatures
free download

ficient batch verifying multiple DSA-type digital signatures instead of verifying each individual digital signature separately. However, there is a weakness in his scheme against his scheme. Keywords: Cryptography, digital signature , DSA. 1 Introduction

Generating a digital signature based on new cryptographic scheme for user authentication and security
free download

This paper analyzes the computer security of systems and importance of the digital signature and hashing message algorithm. The proposed digital signature algorithm gives a new technology for producing effective output of digital signature as a result the signing 1 and

Digital Signature Scheme with Message Recovery Using Knapsack-based ECC.
free download

Digital signature authentication scheme provides secure communication between two users. Digital signatures guarantee end-to-end message integrity and authentication information about the origin of a message. Digital signature schemes reduce transmission costs

Secure implementation of message digest, authentication and digital signature
free download

In this study we present the techniques that are useful in securing the data against tamper in between communicating parties by the man in the middle. This involves the use and implementation of message digest (or hashing), message authentication and digital

Object oriented modelling of RSA digital signature in e-governance security
free download

INTERNATIONAL JOURNAL ON COMPUTER ENGINEERING AND INFORMATION TECHNOLOGY ISSN 0974-203 IJCEIT 2011 July 2011 SUMMER EDITION 2011 PP[24-33], Volume 2 Issue No 01 Abhishek Roy, Subhadeep Banik Sunil Karforma Scientific Engineering Research

The Lattice-Based Digital Signature Scheme qTESLA.
free download

We present qTESLA, a family of post-quantum digital signature schemes that exhibits several attractive features such as simplicity and strong security guarantees against quantum adversaries, and built-in protection against certain side-channel and fault attacks

Id-based digital signature algorithms
free download

Page 1. ID-based Digital Signature Algorithms Jerome A. Solinas National Security Agency ECC 03 Page 2. ID-based Cryptography Public key = Users ID Dont need certificates to authenticate Based on bilinear pairings on elliptic curves Page 3. Bilinear Pairings k QP kQP

TSH-ESIGN: Efficient Digital Signature Scheme Using Trisection Size Hash (Submission to P1363a)
free download

We describe a practical digital signature scheme, TSH-ESIGN, which is more efficient than any representative signature scheme such as elliptic curve and RSA based signature schemes. Moreover, TSH-ESIGN is provably secure in the strongest sense (existentially

Anonymous payment in a Kiosk centric model using digital signature scheme with message recovery and low computational power devices
free download

In this paper we present an anonymous protocol for a mobile payment system based on a Kiosk Centric Case Mobile Scenario where the customer cannot communicate with the issuer due to absence of Internet access with her mobile device and the costs of

Enhancing data security in cloud computing using 3D framework digital signature with encryption
free download

Cloud Computing is emerging technology which consist of existing techniques combined with new technology paradigms. In this new technology shared resources like softwares, hardwares and information is provided to its users and other peoples on internet whenever

Digital signatures, certificates and electronic commerce
free download

A digital signature is provided when the enciphering key is kept private and the deciphering key is made public, so that anyone with the public key can decipher a message that only the keyholder could have enciphered 8.6. The Characteristics of Digital Signature Certificates

Secure data storage in the cloud using digital signature mechanism
free download

Cloud computing services need to address the security during the transmission of sensitive data and critical applications to shared and public cloud environments. The cloud environments are scaling large for data processing and storage needs. Cloud computing

Crystals dilithium: Digital signatures from module lattices
free download

In this paper, we present a new digital signature scheme Dilithium, whose security is based on the hardness of finding short vectors in lattices Page 4. 240 CRYSTALS- Dilithium: A Lattice-Based Digital Signature Scheme Key Generation CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER