[go: up one dir, main page]

Kumar et al., 2012 - Google Patents

An extension of elgamal digital signature algorithm

Kumar et al., 2012

View PDF
Document ID
6535462237576791163
Author
Kumar P
Dungdung B
Publication year

External Links

Snippet

As for the problem that ElGamal digital signature scheme's security is constantly being challenged and is becoming more and more serious, an improved ElGamal digital signature algorithm was proposed. As the original ElGamal algorithm has its own security …
Continue reading at ethesis.nitrkl.ac.in (PDF) (other versions)

Similar Documents

Publication Publication Date Title
WO2021042685A1 (en) Transaction method, device, and system employing blockchain
US9800418B2 (en) Signature protocol
Poettering et al. Double-authentication-preventing signatures
CN103988466A (en) Group encryption method and device
US20150006900A1 (en) Signature protocol
Shim Design principles of secure certificateless signature and aggregate signature schemes for IoT environments
Kumar et al. An efficient implementation of digital signature algorithm with SRNN public key cryptography
Elkamchouchi et al. An efficient proxy signcryption scheme based on the discrete logarithm problem
Kuzhalvaimozhi et al. Privacy protection in cloud using identity based group signature
WO2016187689A1 (en) Signature protocol
Tanwar Basics of cryptographic primitives for blockchain development
Kumar et al. An extension of elgamal digital signature algorithm
Saadatmandan et al. Digital Certificate of Public Key for User Authentication and Session Key Establishment for Secure Network Communications
Tsaur Secure communication for electronic business applications in mobile agent networks
Chung et al. A study on efficient group-oriented signature schemes for realistic application environment
Elkamchouchi et al. A new efficient strong proxy signcryption scheme based on a combination of hard problems
Yang et al. On the authentication of certificateless RSA public key
Lee et al. Toward a secure single sign-on mechanism for distributed computer networks
Hwang A note on an identity-based ring signature scheme with signer verifiability
Błaśkiewicz et al. Two-Head Dragon Protocol: Preventing Cloning of Signature Keys: Work in Progress
Kumar Security Analysis and Implementation of an Improved Cch2 Proxy Multi-Signature Scheme
Terrance et al. In-depth Analysis of the Performance of RSA and ECC in Digital Signature Application
Foster Study and Implementation of Algorithms for Digital Signatures in Network Security
Chang et al. A verifiable proxy signature scheme based on bilinear pairings with identity-based cryptographic approaches
Shingari et al. Achieving data integrity by forming the digital signature using RSA and SHA-1 algorithm