constituents of most public-key cryptosystems. Amongst the numerous As an example of the proposed techniques the Elliptic Curve Digital Signature.
Approved cryptographic algorithms and techniques include those that are ANS X9.31-1998 Digital Signatures Using Reversible Public Key Cryptography for ...
03-Jun-2009 Approved cryptographic algorithms and techniques include those that are ... ANS X9.31-1998 Digital Signatures Using Reversible Public Key ...
A threshold signature scheme enables n parties to share the power to issue digital signatures under a single public key. A threshold t is specified such that
A Method for. Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2)
SHAMIR & L. ADLEMAN "A method for obtaining digital signatures and public-key cryptosystems
A method for obtaining digital signatures and public-key cryptosystems. CACM 21:120–126
Who Holds t:he Keys? I. NIST's Proposal he U.S. Government agency NIST has recently proposed a public key digital signature standard [
public-key cryptosystem each person gets a pair of keys
A Method for Obtaining Digital. Signatures and Public Key Cryptosystems. Communications of the ACM. 21 2 :120 6