A security analysis of public key cryptographic systems used for electronic signature

被引:0
|
作者
Neacșu, Eugen [1 ]
Șchiopu, Paul [2 ]
机构
[1] Advanced Technologies Institute, Bucharest, Romania
[2] University POLITEHNICA of Bucharest, Romania
关键词
Electronic document identification systems;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:135 / 146
相关论文
共 50 条
  • [1] A SECURITY ANALYSIS OF PUBLIC KEY CRYPTOGRAPHIC SYSTEMS USED FOR ELECTRONIC SIGNATURE
    Neacsu, Eugen
    Schiopu, Paul
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2021, 83 (01): : 135 - 146
  • [2] Performance Analysis of Public key Cryptographic Systems RSA and NTRU
    Challa, Narasimham
    Pradhan, Jayaram
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (08): : 87 - 96
  • [3] Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
    Chen, Jiahui
    Ling, Jie
    Ning, Jianting
    Panaousis, Emmanouil
    Loukas, George
    Liang, Kaitai
    Chen, Jiageng
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (04)
  • [4] ID-BASED PUBLIC KEY CRYPTOGRAPHIC SYSTEMS
    Cheremushkin, A. V.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2023, (61): : 44 - 85
  • [5] Cryptographic security concerns on timestamp sharing via a public channel in quantum-key-distribution systems
    Pahali, Melis
    Durak, Kadir
    Tefek, Utku
    PHYSICAL REVIEW A, 2022, 106 (01)
  • [6] Public-key security systems
    Univ of New Orleans, New Orleans, United States
    IEEE Micro, 3 (10-13):
  • [7] Public-key security systems
    Abdelguerfi, M
    Kaliski, BS
    Patterson, W
    IEEE MICRO, 1996, 16 (03) : 10 - 13
  • [8] Security Analysis of Cryptographic Constructions used within Communications in Modem Transportation Systems on the Base of Modelling
    Durech, Jan
    Franekova, Maria
    Holecko, Peter
    Bubenikova, Emillia
    2014 ELEKTRO, 2014, : 424 - 429
  • [9] ONLINE PUBLIC KEY CRYPTOGRAPHIC SCHEME FOR DATA SECURITY IN BRIDGE HEALTH MONITORING
    Xu Feng
    Lv Xin
    Jiang Rongyan
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2010, 16 (05): : 787 - 795
  • [10] Cryptographic key generation using handwritten signature
    Freire-Santos, M.
    Fierrez-Aguilar, J.
    Ortega-Garcia, J.
    BIOMETRIC TECHNOLOGY FOR HUMAN IDENTIFICATION III, 2006, 6202