Randomized Hashing for Digital Signatures.
(05/01/2014)
NIST approved digital signature algorithms require the use of an approved cryptographic hash function in the generation and verification of signatures. Approved cryptographic hash functions and digital signature algorithms can be found in (FIPS 180-3) and (FIPS 186-3), respectively. The security provided by the cryptographic hash function is vital to the security of a digital signature application. This Recommendation specifies a method to enhance the security of the cryptographic hash functions used in digital signature applications by randomizing the messages that are signed....
Tác giả: Dang, Q. |
Số trang: 17 |
Lĩnh vực: CNTT |
Năm XB: 2009 |
Loại tài liệu: Khác
Tài liệu cần xác thực trước khi tải
Tiêu đề | Tải về |
Randomized Hashing for Digital Signatures. | Số trang: 17
| Loại file:
NIST approved digital signature algorithms require the use of an approved cryptographic hash function in the generation and verification of signatures. Approved cryptographic hash functions and digital signature algorithms can be found in (FIPS 180-3) and (FIPS 186-3), respectively. The security provided by the cryptographic hash function is vital to the security of a digital signature application. This Recommendation specifies a method to enhance the security of the cryptographic hash functions used in digital signature applications by randomizing the messages that are signed.
|
miễn phí
|
© Copyright 2012 Trung tâm Thông tin Khoa học và Công nghệ - Sở Khoa học & Công nghệ TP. Cần Thơ
Địa chỉ: 118/3 Trần Phú - P.Cái Khế - Q.Ninh Kiều - TPCT
Điện thoại: 0292 3824031 Fax: 0292 3812352
|
|
Lượt truy cập:
(Website trong thời gian thử nghiệm)