On the security of digital signature protocol based on iterated function systems.
A common goal of cryptographic research is to design protocols that provide a confidential and authenticated transmission channel for messages over an insecure network. Hash functions are used within digital signature schemes to provide data integrity for cryptographic applications. In this paper, w...
| Main Authors: | M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Hikari Ltd
2011
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/25177/ http://psasir.upm.edu.my/id/eprint/25177/1/On%20the%20security%20of%20digital%20signature%20protocol%20based%20on%20iterated%20function%20systems.pdf |
Similar Items
Improved digital signature protocol using iterated function systems.
by: Al-Saidi, Nadia M.G., et al.
Published: (2011)
by: Al-Saidi, Nadia M.G., et al.
Published: (2011)
A new idea in zero knowledge protocols based on iterated function systems
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2011)
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2011)
Fractal attractor based digital signature
by: Al-Saidi, Nadia M. G., et al.
Published: (2010)
by: Al-Saidi, Nadia M. G., et al.
Published: (2010)
Biometric identification using local iterated function
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2014)
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2014)
A Cryptosystem Analogous to LUCELG and a
Digital Signature Scheme
by: Yoong, Choo Mun, et al.
Published: (2005)
by: Yoong, Choo Mun, et al.
Published: (2005)
Efficiency analysis for public key systems based on fractal functions.
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011)
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
A digital signature system.
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2010)
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2010)
Stegano-image as a digital signature to improve security authentication system in mobile computing
by: Mantoro, Teddy, et al.
Published: (2016)
by: Mantoro, Teddy, et al.
Published: (2016)
Digital signature algorithm
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Security mediated certificateless signatures
by: Yap, Nvun-She, et al.
Published: (2007)
by: Yap, Nvun-She, et al.
Published: (2007)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A new public key cryptosystem based on IFS
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2010)
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2010)
A New Proxy Signature Scheme As Secure As ElGamal Signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Securing anonymous authenticated announcement protocol for group signature in internet of vehicle / Nur Afiqah Suzelan Amir
by: Nur Afiqah , Suzelan Amir
Published: (2021)
by: Nur Afiqah , Suzelan Amir
Published: (2021)
Secure E-Voting With Blind Signature
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
Generalized Scheme For Fractal Based Digital Signature (GFDS).
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
A new approach in cryptographic systems using fractal image coding
by: Mohammed Ghanim Al - Saidi, Nadia, et al.
Published: (2009)
by: Mohammed Ghanim Al - Saidi, Nadia, et al.
Published: (2009)
The application of the digital signature laws in governing internet banking security in Malaysia : with special reference to the EU directive and the UK laws on electronic signature / Hartini Saripan
by: Saripan, Hartini
Published: (2012)
by: Saripan, Hartini
Published: (2012)
Digital security locking system – USB based GSM security system
by: Chai, Chong Yi
Published: (2011)
by: Chai, Chong Yi
Published: (2011)
Digital Signature-based authentication framework in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
A secure and efficient revocation protocol for group signatures in vehicular ad hoc networks / Nur Fadhilah Mohd Shari
by: Nur Fadhilah , Mohd Shari
Published: (2018)
by: Nur Fadhilah , Mohd Shari
Published: (2018)
Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
by: Ling, Huo-Chong, et al.
Published: (2007)
by: Ling, Huo-Chong, et al.
Published: (2007)
Revising the flaws of the digital signature act 1997 in governing security of electronic transactions / Hartini Saripan and Zaiton Hamin
by: Saripan, Hartini, et al.
Published: (2011)
by: Saripan, Hartini, et al.
Published: (2011)
Name-signature lookup system: a security enhancement to named data networking
by: Song, Zhicheng, et al.
Published: (2021)
by: Song, Zhicheng, et al.
Published: (2021)
Comparison of the iterative jacobi method and the iterative Domain Green'S Function Method for finite array analysis
by: Ludick, D., et al.
Published: (2016)
by: Ludick, D., et al.
Published: (2016)
Relations among security notions for undeniable signature schemes
by: Kurosawa, Kaoru, et al.
Published: (2006)
by: Kurosawa, Kaoru, et al.
Published: (2006)
The security of the FDH variant of Chaum's undeniable signature scheme
by: Ogata, Wakaha, et al.
Published: (2006)
by: Ogata, Wakaha, et al.
Published: (2006)
Secure Digital Camera Based Fingerprint Recognition System
by: Hiew, Bee Yan
Published: (2008)
by: Hiew, Bee Yan
Published: (2008)
A new direction in utilization of chaotic fractal functions for cryptosystems.
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
The vulnerability analysis and the security evaluation of block ciphers
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
A New Digital Signature Scheme Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Offline Handwritten Signature Watermark for Digital Document Authentication
by: Low, Cheng Yaw
Published: (2008)
by: Low, Cheng Yaw
Published: (2008)
Offline Handwritten Signature Watermark For Digital Document Authentication
by: Yaw, Low Cheng
Published: (2008)
by: Yaw, Low Cheng
Published: (2008)
Estimation of unknown functions of iterative difference inequalities and their applications
by: Luo, R., et al.
Published: (2014)
by: Luo, R., et al.
Published: (2014)
Dynamics and complexity of a new 4D chaotic laser system
by: Kadhim, Hayder Natiq, et al.
Published: (2019)
by: Kadhim, Hayder Natiq, et al.
Published: (2019)
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
by: Hintaw, Ahmed Jameel
Published: (2023)
by: Hintaw, Ahmed Jameel
Published: (2023)
The block cipher algorithm–properties, encryption efficiency analysis and security evaluation
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
Security enhancement of dynamic signature by utilizing local features with individual threshold
by: Suryanti, Awang, et al.
Published: (2018)
by: Suryanti, Awang, et al.
Published: (2018)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
Similar Items
-
Improved digital signature protocol using iterated function systems.
by: Al-Saidi, Nadia M.G., et al.
Published: (2011) -
A new idea in zero knowledge protocols based on iterated function systems
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2011) -
Fractal attractor based digital signature
by: Al-Saidi, Nadia M. G., et al.
Published: (2010) -
Biometric identification using local iterated function
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2014) -
A Cryptosystem Analogous to LUCELG and a
Digital Signature Scheme
by: Yoong, Choo Mun, et al.
Published: (2005)