The Download link is Generated: Download https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/94-05.pdf


Double-Speed Barrett Moduli

constituents of most public-key cryptosystems. Amongst the numerous As an example of the proposed techniques the Elliptic Curve Digital Signature.



Digital Signature Standard (DSS)

Approved cryptographic algorithms and techniques include those that are ANS X9.31-1998 Digital Signatures Using Reversible Public Key Cryptography for ...



FIPS 186-3 Digital Signature Standard (DSS)

03-Jun-2009 Approved cryptographic algorithms and techniques include those that are ... ANS X9.31-1998 Digital Signatures Using Reversible Public Key ...



Fast Multiparty Threshold ECDSA with Fast Trustless Setup

A threshold signature scheme enables n parties to share the power to issue digital signatures under a single public key. A threshold t is specified such that 



Practical Byzantine Fault Tolerance

A Method for. Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2)



Modular Multiplication Without Trial Division Author(s): Peter L

SHAMIR & L. ADLEMAN "A method for obtaining digital signatures and public-key cryptosystems



CacheBleed: A Timing Attack on OpenSSL Constant Time RSA

A method for obtaining digital signatures and public-key cryptosystems. CACM 21:120–126



Responses to NISTs proposal

Who Holds t:he Keys? I. NIST's Proposal he U.S. Government agency NIST has recently proposed a public key digital signature standard [ 



Survey of Computational Assumptions Used in Cryptography Broken

public-key cryptosystem each person gets a pair of keys



Addressing Weaknesses in the Domain Name System Protocol

A Method for Obtaining Digital. Signatures and Public Key Cryptosystems. Communications of the ACM. 21 2 :120 6