A security analysis of public key cryptographic systems used for electronic signature

被引:0
|
作者
Neacșu, Eugen [1 ]
Șchiopu, Paul [2 ]
机构
[1] Advanced Technologies Institute, Bucharest, Romania
[2] University POLITEHNICA of Bucharest, Romania
关键词
Electronic document identification systems;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:135 / 146
相关论文
共 50 条
  • [41] The Analysis of Intensity Correlation in Laser Transceiving Systems for Formation of a Cryptographic Key
    Aksenov, V. P.
    Dudorov, V. V.
    Kolosov, V. V.
    Pogutsa, Ch. E.
    Levitskii, M. E.
    ATMOSPHERIC AND OCEANIC OPTICS, 2020, 33 (06) : 571 - 577
  • [42] IMPLEMENTATION STUDY OF PUBLIC KEY CRYPTOGRAPHIC PROTECTION IN AN EXISTING ELECTRONIC MAIL AND DOCUMENT HANDLING-SYSTEM
    VANDEWALLE, J
    GOVAERTS, R
    DECROOS, M
    SPEYBROUCK, G
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 219 : 43 - 49
  • [43] Certificateless public key encryption with cryptographic reverse firewalls
    Zhou, Yuyang
    Guo, Jing
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 109
  • [44] Quantum walk public-key cryptographic system
    Vlachou, C.
    Rodrigues, J.
    Mateus, P.
    Paunkovic, N.
    Souto, A.
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2015, 13 (07)
  • [45] A PUBLIC-KEY EXTENSION TO THE COMMON CRYPTOGRAPHIC ARCHITECTURE
    LE, AV
    MATYAS, SM
    JOHNSON, DB
    WILKINS, JD
    IBM SYSTEMS JOURNAL, 1993, 32 (03) : 461 - 485
  • [46] A public-key cryptographic processor for RSA and ECC
    Eberle, H
    Gura, N
    Shantz, SLC
    Gupta, V
    Rarick, L
    Sundaran, S
    15TH IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, PROCEEDINGS, 2004, : 98 - 110
  • [47] Logic for verifying public-key cryptographic protocols
    Coffey, T
    Saidha, P
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (01): : 28 - 32
  • [48] Public key cryptosystem based on two cryptographic assumptions
    Baocang, W
    Yupu, H
    IEE PROCEEDINGS-COMMUNICATIONS, 2005, 152 (06): : 861 - 865
  • [49] Public key cryptographic system using Mandelbrot sets
    Kumar, Suthikshn
    MILCOM 2006, VOLS 1-7, 2006, : 3610 - 3614
  • [50] Program Analysis of Cryptographic Implementations for Security
    Rahaman, Sazzadur
    Yao, Danfeng
    2017 IEEE CYBERSECURITY DEVELOPMENT (SECDEV), 2017, : 61 - 68