Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Digital signature

Known as: Signature (disambiguation), Digital signatures, Adaptive chosen message attack 
A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or documents. A valid digital signature gives a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2001
Highly Cited
2001
The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA… Expand
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We present a new protocol that allows two players to exchange digital signatures over the Internet in a fair way, so that either… Expand
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Abstract : This standard specifies a suite of algorithms, which can be used to generate a digital signature. Digital signatures… Expand
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We describe a digital signature scheme in which the public key is fixed but the secret signing key is updated at regular… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Secure and authenticated message delivery/storage is one of the major aims of computer and communication security research. The… Expand
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
1989
Highly Cited
1989
A practical digital signature system based on a conventional encryption function which is as secure as the conventional… Expand
Is this relevant?
Highly Cited
1988
Highly Cited
1988
We present a digital signature scheme based on the computational difficulty of integer factorization.The scheme possesses the… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1987
Highly Cited
1987
A new digital signature based only on a conventional encryption function (such as DES) is described which is as secure as the… Expand
Is this relevant?
Highly Cited
1983
Highly Cited
1983
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the… Expand
  • table I
Is this relevant?
Highly Cited
1978
Highly Cited
1978
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the… Expand
  • table I
Is this relevant?