On the security of digital signature protocol based on iterated function systems.
A common goal of cryptographic research is to design protocols that provide a confidential and authenticated transmission channel for messages over an insecure network. Hash functions are used within digital signature schemes to provide data integrity for cryptographic applications. In this paper, w...
Saved in:
Main Authors: | M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan |
---|---|
Format: | Article |
Language: | English English |
Published: |
Hikari Ltd
2011
|
Online Access: | http://psasir.upm.edu.my/id/eprint/25177/1/On%20the%20security%20of%20digital%20signature%20protocol%20based%20on%20iterated%20function%20systems.pdf http://psasir.upm.edu.my/id/eprint/25177/ http://www.m-hikari.com/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Improved digital signature protocol using iterated function systems.
by: Al-Saidi, Nadia M.G., et al.
Published: (2011) -
A new idea in zero knowledge protocols based on iterated function systems
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2011) -
Fractal attractor based digital signature
by: Al-Saidi, Nadia M. G., et al.
Published: (2010) -
Biometric identification using local iterated function
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2014) -
Secure digital signature schemes based on hash functions
by: Noroozi, Erfaneh, et al.
Published: (2013)