On the security of digital signature protocol based on iterated function systems.
A common goal of cryptographic research is to design protocols that provide a confidential and authenticated transmission channel for messages over an insecure network. Hash functions are used within digital signature schemes to provide data integrity for cryptographic applications. In this paper, w...
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Hikari Ltd
2011
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/25177/ http://psasir.upm.edu.my/id/eprint/25177/1/On%20the%20security%20of%20digital%20signature%20protocol%20based%20on%20iterated%20function%20systems.pdf |