A security analysis of public key cryptographic systems used for electronic signature

被引:0
|
作者
Neacșu, Eugen [1 ]
Șchiopu, Paul [2 ]
机构
[1] Advanced Technologies Institute, Bucharest, Romania
[2] University POLITEHNICA of Bucharest, Romania
关键词
Electronic document identification systems;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:135 / 146
相关论文
共 50 条
  • [31] A portable hardware security module and cryptographic key generator
    Murtaza, Malik Hamza
    Tahir, Hasan
    Tahir, Shahzaib
    Alizai, Zahoor Ahmed
    Riaz, Qaiser
    Hussain, Mehdi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 70
  • [32] Classical and Physical Security of Symmetric Key Cryptographic Algorithms
    Baksi, Anubhab
    PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 186 - 187
  • [33] On the round security of symmetric-key cryptographic primitives
    Ramzan, Z
    Reyzin, L
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 376 - 393
  • [34] Electromagnetic Analysis against Public-Key Cryptographic Software on Embedded OS
    Uno, Hajime
    Endo, Sho
    Homma, Naofumi
    Hayashi, Yu-ichi
    Aoki, Takafumi
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (07) : 1242 - 1249
  • [35] Cryptographic systems using a self-certified public key based on discrete logarithms
    Shao, Z
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 2001, 148 (06): : 233 - 237
  • [36] On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key
    Zhang, Jianhong
    Zou, Wei
    Chen, Dan
    Wang, Yumin
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2005, 29 (03): : 343 - 346
  • [37] On the security of a digital signature with message recovery using self-certified public key
    Zhang, JH
    Li, HA
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1171 - 1174
  • [38] Security Analysis of an Improved MFE Public Key Cryptosystem
    Nie, Xuyun
    Xu, Zhaohu
    Lu, Li
    Liao, Yongjian
    CRYPTOLOGY AND NETWORK SECURITY, 2011, 7092 : 118 - 125
  • [39] Security analysis of public-key watermarking schemes
    Craver, S
    Katzenbeisser, S
    MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION IV, WITH APPLICATIONS, 2001, 4475 : 172 - 182
  • [40] The Analysis of Intensity Correlation in Laser Transceiving Systems for Formation of a Cryptographic Key
    V. P. Aksenov
    V. V. Dudorov
    V. V. Kolosov
    Ch. E. Pogutsa
    M. E. Levitskii
    Atmospheric and Oceanic Optics, 2020, 33 : 571 - 577