In cryptography, a key signature is the result of a third-party applying a cryptographic signature to a representation of a cryptographic key. Thisâ€¦Â (More)

Semantic Scholar uses AI to extract papers important to this topic.

2009

2009

- Man Ho Au, Willy Susilo, Yiming Mu
- ProvSec
- 2009

On-line/Off-line signatures are useful in many applications where the signer has a very limited response time once the message isâ€¦Â (More)

Is this relevant?

2006

2006

- Chandana Gamage, Ben Gras, Bruno Crispo, Andrew S. Tanenbaum
- 2006 Securecomm and Workshops
- 2006

There are many applications in which it is necessary to transmit authenticatable messages while achieving certain privacy goalsâ€¦Â (More)

Is this relevant?

Highly Cited

2005

Highly Cited

2005

- Jintai Ding, Dieter Schmidt
- ACNS
- 2005

Balanced Oil and Vinegar signature schemes and the unbalanced Oil and Vinegar signature schemes are public key signature schemesâ€¦Â (More)

Is this relevant?

2005

2005

- Kemal Bicakci, Nazife Baykal
- Computer Networks
- 2005

It is well known that excessive computational demands of public key cryptography have made its use limited especially whenâ€¦Â (More)

Is this relevant?

2005

2005

- Yi-Hwa Chen, Jinn-ke Jan
- Operating Systems Review
- 2005

In 2003, Tseng et al. proposed a self-certified public key signature with message recovery, which gives two advantages: one isâ€¦Â (More)

Is this relevant?

Highly Cited

2002

Highly Cited

2002

- Florian Hess
- Selected Areas in Cryptography
- 2002

We develop an eecient identity based signature scheme based on pairings whose security relies on the hardness of the Diie-Hellmanâ€¦Â (More)

Is this relevant?

1997

1997

This paper describes an approach to module composition by executing \module expressions" to build systems out of componentâ€¦Â (More)

Is this relevant?

1997

1997

- Joseph A. Goguen
- 1997

This paper describes an approach to module composition by executing \module expressions" to build systems out of componentâ€¦Â (More)

Is this relevant?

Highly Cited

1993

Highly Cited

1993

- Adi Shamir
- CRYPTO
- 1993

Many public key cryptographic schemes (such as cubic RSA) are based on low degree polynomials whose inverses are high degreeâ€¦Â (More)

Is this relevant?

1993

1993

- Adi Shamir
- 1993

Many public key cryptographic schemes (such a s c u b i c RSA) are based on low degree polynomials whose inverses are high degreeâ€¦Â (More)

Is this relevant?