On the security of digital signature protocol based on iterated function systems.

A common goal of cryptographic research is to design protocols that provide a confidential and authenticated transmission channel for messages over an insecure network. Hash functions are used within digital signature schemes to provide data integrity for cryptographic applications. In this paper, w...

Full description

Saved in:
Bibliographic Details
Main Authors: M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan
Format: Article
Language:English
English
Published: Hikari Ltd 2011
Online Access:http://psasir.upm.edu.my/id/eprint/25177/1/On%20the%20security%20of%20digital%20signature%20protocol%20based%20on%20iterated%20function%20systems.pdf
http://psasir.upm.edu.my/id/eprint/25177/
http://www.m-hikari.com/
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items