All Fields
Computer Science
Medicine
FAQ
Contact
Sign in
Key signature
In cryptography, a key signature is the result of a third-party applying a cryptographic signature to a representation of a cryptographic key. This…Â
(More)
Wikipedia
Topic mentions per year
Topic mentions per year
1987-2016
0
5
10
1987
2016
Related topics
Related topics
6 relations
Cryptography
Hash function
Key
Public key certificate
(More)
Broader (1)
Key management
Related mentions per year
Related mentions per year
1939-2018
1940
1960
1980
2000
2020
Key signature
Cryptography
Key
Hash function
Public key certificate
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2009
2009
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?
Man Ho Au
,
Willy Susilo
,
Yiming Mu
ProvSec
2009
On-line/Off-line signatures are useful in many applications where the signer has a very limited response time once the message is…Â
(More)
Is this relevant?
2006
2006
An Identity-based Ring Signature Scheme with Enhanced Privacy
Chandana Gamage
,
Ben Gras
,
Bruno Crispo
,
Andrew S. Tanenbaum
2006 Securecomm and Workshops
2006
There are many applications in which it is necessary to transmit authenticatable messages while achieving certain privacy goals…Â
(More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Rainbow, a New Multivariable Polynomial Signature Scheme
Jintai Ding
,
Dieter Schmidt
ACNS
2005
Balanced Oil and Vinegar signature schemes and the unbalanced Oil and Vinegar signature schemes are public key signature schemes…Â
(More)
Is this relevant?
2005
2005
Improved server assisted signatures
Kemal Bicakci
,
Nazife Baykal
Computer Networks
2005
It is well known that excessive computational demands of public key cryptography have made its use limited especially when…Â
(More)
Is this relevant?
2005
2005
Enhancement of digital signature with message recovery using self-certified public keys and its variants
Yi-Hwa Chen
,
Jinn-ke Jan
Operating Systems Review
2005
In 2003, Tseng et al. proposed a self-certified public key signature with message recovery, which gives two advantages: one is…Â
(More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Efficient Identity Based Signature Schemes Based on Pairings
Florian Hess
Selected Areas in Cryptography
2002
We develop an eecient identity based signature scheme based on pairings whose security relies on the hardness of the Diie-Hellman…Â
(More)
Is this relevant?
1997
1997
An Implementation-oriented Semantics for Module Composition 1.1 Introduction
Joseph A. Goguen
,
Will Tracz
1997
This paper describes an approach to module composition by executing \module expressions" to build systems out of component…Â
(More)
Is this relevant?
1997
1997
An Implementation - Oriented Semanticsfor Module Composition
Joseph A. Goguen
1997
This paper describes an approach to module composition by executing \module expressions" to build systems out of component…Â
(More)
Is this relevant?
Highly Cited
1993
Highly Cited
1993
Efficient Signature Schemes Based on Birational Permutations
Adi Shamir
CRYPTO
1993
Many public key cryptographic schemes (such as cubic RSA) are based on low degree polynomials whose inverses are high degree…Â
(More)
Is this relevant?
1993
1993
Signature Schemes Based on Birational Permutations
Adi Shamir
1993
Many public key cryptographic schemes (such a s c u b i c RSA) are based on low degree polynomials whose inverses are high degree…Â
(More)
Is this relevant?