Kumar et al., 2012 - Google Patents
An extension of elgamal digital signature algorithmKumar et al., 2012
View PDF- Document ID
- 6535462237576791163
- Author
- Kumar P
- Dungdung B
- Publication year
External Links
Snippet
As for the problem that ElGamal digital signature scheme's security is constantly being challenged and is becoming more and more serious, an improved ElGamal digital signature algorithm was proposed. As the original ElGamal algorithm has its own security …
- 238000004458 analytical method 0 abstract description 8
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021042685A1 (en) | Transaction method, device, and system employing blockchain | |
US9800418B2 (en) | Signature protocol | |
Poettering et al. | Double-authentication-preventing signatures | |
CN103988466A (en) | Group encryption method and device | |
US20150006900A1 (en) | Signature protocol | |
Shim | Design principles of secure certificateless signature and aggregate signature schemes for IoT environments | |
Kumar et al. | An efficient implementation of digital signature algorithm with SRNN public key cryptography | |
Elkamchouchi et al. | An efficient proxy signcryption scheme based on the discrete logarithm problem | |
Kuzhalvaimozhi et al. | Privacy protection in cloud using identity based group signature | |
WO2016187689A1 (en) | Signature protocol | |
Tanwar | Basics of cryptographic primitives for blockchain development | |
Kumar et al. | An extension of elgamal digital signature algorithm | |
Saadatmandan et al. | Digital Certificate of Public Key for User Authentication and Session Key Establishment for Secure Network Communications | |
Tsaur | Secure communication for electronic business applications in mobile agent networks | |
Chung et al. | A study on efficient group-oriented signature schemes for realistic application environment | |
Elkamchouchi et al. | A new efficient strong proxy signcryption scheme based on a combination of hard problems | |
Yang et al. | On the authentication of certificateless RSA public key | |
Lee et al. | Toward a secure single sign-on mechanism for distributed computer networks | |
Hwang | A note on an identity-based ring signature scheme with signer verifiability | |
Błaśkiewicz et al. | Two-Head Dragon Protocol: Preventing Cloning of Signature Keys: Work in Progress | |
Kumar | Security Analysis and Implementation of an Improved Cch2 Proxy Multi-Signature Scheme | |
Terrance et al. | In-depth Analysis of the Performance of RSA and ECC in Digital Signature Application | |
Foster | Study and Implementation of Algorithms for Digital Signatures in Network Security | |
Chang et al. | A verifiable proxy signature scheme based on bilinear pairings with identity-based cryptographic approaches | |
Shingari et al. | Achieving data integrity by forming the digital signature using RSA and SHA-1 algorithm |