Search results

Jump to navigation Jump to search
Results 1 – 21 of 351
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • {{short description|Digital signature algorithm}} In [[cryptography]], '''GMR''' is a [[digital signature]] [[algorithm]] named after its inventors [[Shafi Goldwasser]], [[Silvio Mi ...
    1 KB (156 words) - 11:17, 24 August 2024
  • ...heval|first1=David|last2=Stern|first2=Jacques|title=Security Arguments for Digital Signatures and Blind Signatures|journal=Cryptology|date=2000|volume=13|issu {{DEFAULTSORT:Pointcheval-Stern signature algorithm}} ...
    1 KB (198 words) - 05:45, 16 January 2024
  • ....nist.gov/nistpubs/FIPS/NIST.FIPS.186-5.pdf|title= FIPS PUB 186-5: Digital Signature Standard (DSS), 2023-02-03|website= csrc.nist.gov}}</ref> ...al requirements, and contains a definition of the [[Elliptic Curve Digital Signature Algorithm]] based on the definition provided by [[American National Standar ...
    2 KB (358 words) - 22:25, 20 February 2025
  • {{Short description|Cryptographic signature scheme}} ...ash''' ('''FDH''') is an [[RSA (algorithm)|RSA]]-based [[digital signature|signature]] scheme that follows the ''hash-and-sign'' paradigm. It is [[provable secu ...
    2 KB (293 words) - 01:25, 9 March 2025
  • ...assumption was first used for constructing [[digital signature|signature]] schemes [[provable security|provably secure]] against [[existential forgery]] witho ...., Pfitzmann B. (1997) Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees. In: Fumy W. (eds) Advances in Cryptology – EUROCRYPT ’97. EU ...
    2 KB (240 words) - 09:25, 13 January 2024
  • {{Short description|Digital signature scheme}} ...age; the verifier uses a bad basis for the same lattice to verify that the signature under consideration is actually a lattice point and is sufficiently close t ...
    2 KB (267 words) - 02:20, 13 November 2023
  • ...key primitive that simultaneously performs the functions of both [[digital signature]] and [[encryption]]. ...ion overheads in comparison with the traditional signature-then-encryption schemes. ...
    7 KB (939 words) - 20:22, 28 January 2025
  • ...ultipart/signed]] and [[multipart/encrypted]] framework to apply [[digital signature]] and [[encryption]] services to [[MIME]] objects. ...lic key management approaches, including both ad hoc and certificate-based schemes. Mechanisms are provided to support many public key management approaches.< ...
    1 KB (167 words) - 17:13, 16 May 2025
  • {{Short description|Form of digital signature}} ...ties. Examples include cryptographic election systems and [[digital cash]] schemes. ...
    10 KB (1,559 words) - 16:00, 21 January 2025
  • This specification includes key agreement, signature, and encryption schemes using several mathematical approaches: [[integer factorization]], ...
    6 KB (678 words) - 03:54, 31 July 2024
  • {{Short description|Digital signature scheme}} ...{cite journal |author=Taher ElGamal |title=A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms |journal=IEEE Transactions on Informati ...
    8 KB (1,200 words) - 23:52, 24 May 2025
  • ...an [[ElGamal signature scheme|ElGamal]] variant, similar to the [[Digital Signature Algorithm]] and GOST R 34.10-94. The standard algorithm is implemented ove * <math>x</math>: signer's private signature key such that <math>0 < x < q</math>. ...
    4 KB (680 words) - 16:13, 20 October 2023
  • ...functions, and also within chosen-ciphertext secure public key encryption schemes. ...y expensive than CRHFs, and are most often used for efficiency purposes in schemes where the choice of the hash function happens at some stage of execution, r ...
    2 KB (364 words) - 14:32, 6 February 2024
  • '''NESSIE''' ('''New European Schemes for Signatures, Integrity and Encryption''') was a [[Europe]]an research pr ===Asymmetric encryption schemes=== ...
    5 KB (657 words) - 12:41, 17 October 2024
  • ...017 }}</ref> This construction was later superseded by the construction of digital signatures from any one-way trapdoor permutation.<ref>{{cite journal | url | contribution = Collision free hash functions and public key signature schemes ...
    5 KB (713 words) - 04:28, 2 December 2024
  • ...e authentication code|authenticate]] or [[encryption|encrypt]] any form of digital data. ...ards, such as [[S/MIME]], [[PKCS 12|PKCS #12]] and the {{IETF RFC|3161}} [[digital timestamping]] protocol. ...
    3 KB (349 words) - 07:10, 20 February 2025
  • {{Short description|NTRU public-key cryptography digital signature algorithm}} ...| last4 = Silverman | first5 = William| last5 = Whyte | title = NTRUSign: Digital Signatures Using the NTRU Lattice | year =2003 | series = LNCS | volume = 2 ...
    6 KB (798 words) - 13:53, 30 May 2025
  • ...uced by [[David Chaum]] and Eugene van Heyst in 1991. For example, a group signature scheme could be used by an employee of a large company where it is sufficie ...nd given to a membership manager and revocation manager respectively. Many schemes have been proposed, however all should follow these basic requirements: ...
    9 KB (1,206 words) - 10:52, 13 July 2024
  • {{short description|Digital signature scheme }} ...' that was invented by [[Claus P. Schnorr|Claus Schnorr]]. It is a digital signature scheme known for its simplicity, among the first whose security is based on ...
    9 KB (1,363 words) - 21:02, 9 June 2025
  • ...sing to verify a signature by omission; a situation that would devalue the signature in the eyes of the verifier. It was invented by [[David Chaum]] and Hans va ..., the signature reveals nothing to a recipient/verifier of the message and signature without taking part in either of two interactive protocols: ...
    7 KB (1,213 words) - 00:43, 7 May 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)