ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
On the Modifications of a Digital Signature Algorithm with Secret Sharing
Mapping Intimacies
◽
10.1109/icoict52021.2021.9527460
◽
2021
◽
Author(s):
Umi Uli Zulfah
◽
Mareta Wahyu Ardyani
Keyword(s):
Secret Sharing
◽
Digital Signature
◽
Digital Signature Algorithm
Download Full-text
Related Documents
Cited By
References
The application of RSA digital signature algorithm in the Power Dispatching work ticket Transmission system
Proceedings of the 10th World Congress on Intelligent Control and Automation
◽
10.1109/wcica.2012.6359168
◽
2012
◽
Author(s):
Chao Hai Kang
◽
Wei Jian Ren
◽
PeiRan Liu
◽
Feng Cai Huo
Keyword(s):
Digital Signature
◽
Transmission System
◽
Digital Signature Algorithm
◽
Power Dispatching
Download Full-text
Securing Digital Signature Algorithm against Side Channel Attacks
Proceedings of the 2020 International Conference on Industrial Engineering and Industrial Management
◽
10.1145/3394941.3394947
◽
2020
◽
Author(s):
Mohamed N. Hassan
◽
Ahmed S. Abo-Taleb
◽
Mohamed Shalaby
Keyword(s):
Digital Signature
◽
Side Channel
◽
Side Channel Attacks
◽
Digital Signature Algorithm
Download Full-text
Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm
2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE)
◽
10.1109/icraie.2016.7939539
◽
2016
◽
Cited By ~ 1
Author(s):
Deepti Jyotiyana
◽
Varun P Saxena
Keyword(s):
Finite Field
◽
Elliptic Curve
◽
Digital Signature
◽
Scalar Multiplication
◽
Fault Attack
◽
Digital Signature Algorithm
Download Full-text
Signature Verification Time Reduction for GOST Digital Signature Algorithm
10.1109/icict52195.2021.9568409
◽
2021
◽
Author(s):
Hamza A.A. Al-Sewadi
◽
Ruqa A. Al-Shnawa
◽
Mohammed M. Rifaat
Keyword(s):
Digital Signature
◽
Signature Verification
◽
Digital Signature Algorithm
◽
Verification Time
◽
Time Reduction
Download Full-text
The Insecurity of the Digital Signature Algorithm with Partially Known Nonces
Cryptographic Applications of Analytic Number Theory
◽
10.1007/978-3-0348-8037-4_17
◽
2003
◽
pp. 201-206
◽
Cited By ~ 1
Author(s):
Igor Shparlinski
Keyword(s):
Digital Signature
◽
Digital Signature Algorithm
Download Full-text
Research and Design of an Improved ElGamal Digital Signature Algorithm
IOP Conference Series Materials Science and Engineering
◽
10.1088/1757-899x/569/5/052041
◽
2019
◽
Vol 569
◽
pp. 052041
Author(s):
Yi Fang
◽
Linhu Cong
◽
Jianqiu Deng
Keyword(s):
Digital Signature
◽
Digital Signature Algorithm
◽
Research And Design
Download Full-text
Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features
Information and Communications Security - Lecture Notes in Computer Science
◽
10.1007/978-3-030-41579-2_25
◽
2020
◽
pp. 430-446
Author(s):
Long Mai
◽
Yuan Yan
◽
Songlin Jia
◽
Shuran Wang
◽
Jianqiang Wang
◽
...
Keyword(s):
Digital Signature
◽
Digital Signature Algorithm
Download Full-text
A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA)
Security, Privacy, and Applied Cryptography Engineering - Lecture Notes in Computer Science
◽
10.1007/978-3-319-71501-8_10
◽
2017
◽
pp. 170-189
Author(s):
Armando Faz-Hernández
◽
Hayato Fujii
◽
Diego F. Aranha
◽
Julio López
Keyword(s):
Digital Signature
◽
Efficient Implementation
◽
Digital Signature Algorithm
Download Full-text
Pairing-Free Identity-Based Digital Signature Algorithm for Broadcast Authentication Based on Modified ECC Using Battle Royal Optimization Algorithm
Wireless Personal Communications
◽
10.1007/s11277-021-09244-y
◽
2021
◽
Author(s):
Vivek Kumar
◽
Sangram Ray
Keyword(s):
Optimization Algorithm
◽
Digital Signature
◽
Digital Signature Algorithm
◽
Identity Based
◽
Broadcast Authentication
Download Full-text
Information Leakage Attacks against Smart Card Implementations of the Elliptic Curve Digital Signature Algorithm
Smart Card Programming and Security - Lecture Notes in Computer Science
◽
10.1007/3-540-45418-7_18
◽
2001
◽
pp. 211-219
◽
Cited By ~ 4
Author(s):
Tanja Römer
◽
Jean-Pierre Seifert
Keyword(s):
Elliptic Curve
◽
Smart Card
◽
Digital Signature
◽
Information Leakage
◽
Digital Signature Algorithm
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close