A symmetric cipher such as AES in cryptography is much faster than an asymmetric cipher but digital signatures often use asymmetric key ciphers because they provides the sender’s identity and data integrity. In this paper, a modified-He digital signature scheme is proposed using a one-way hash function. The proposed scheme, unlike the He signature technique, employs Euclid’s Division Lemma with large prime moduli p. Its security is built on large integer factoring, discrete logarithms and expanded root problems. The time complexity of the proposed scheme is O(log3p). The proposed modified-He scheme is efficient, as evidenced by the analytical results with key lengths greater than 512 bits
[[abstract]]Laih and Kuo proposed two efficient signature schemes based on discrete logarithms and f...
AbstractIn 2010, Liu et al. 1 proposed an improvement of Liu-Li digital signature scheme without one...
A secure and efficient cryptosystem can be constructed through three primary methods, the discrete l...
In 1998, Shao Proposed two digital signature schemes based on factoring and discrete logarithms. At ...
Abstract: Problem statement: A digital signature scheme allows one to sign an electronic message and...
The article proposes new digital signature schemes based on difficulty of simultaneous solving integ...
In 1998, Shao proposed two digital signature schemes and claimed that the security of which is based...
To make users put much confidence in digital signatures, this paper proposes the first provably secu...
Abstract- The data encryption using digital signature technique is essential for secure transactions...
AbstractIn 2010, Liu et al. 1 proposed an improvement of Liu-Li digital signature scheme without one...
Abstract: Digital signature scheme is a fundamental cryptographic tool which allows one to sign an e...
A hybrid cryptographic system providing digital authentication is described and analyzed in this pap...
Abstract Laih and Kuo proposed two efficient signature schemes based on discrete logarithms and fact...
We present a new digital signature scheme with message recovery and its authenticated encryption bas...
In this paper, we present another tree-structure signature scheme based on discrete logarithm proble...
[[abstract]]Laih and Kuo proposed two efficient signature schemes based on discrete logarithms and f...
AbstractIn 2010, Liu et al. 1 proposed an improvement of Liu-Li digital signature scheme without one...
A secure and efficient cryptosystem can be constructed through three primary methods, the discrete l...
In 1998, Shao Proposed two digital signature schemes based on factoring and discrete logarithms. At ...
Abstract: Problem statement: A digital signature scheme allows one to sign an electronic message and...
The article proposes new digital signature schemes based on difficulty of simultaneous solving integ...
In 1998, Shao proposed two digital signature schemes and claimed that the security of which is based...
To make users put much confidence in digital signatures, this paper proposes the first provably secu...
Abstract- The data encryption using digital signature technique is essential for secure transactions...
AbstractIn 2010, Liu et al. 1 proposed an improvement of Liu-Li digital signature scheme without one...
Abstract: Digital signature scheme is a fundamental cryptographic tool which allows one to sign an e...
A hybrid cryptographic system providing digital authentication is described and analyzed in this pap...
Abstract Laih and Kuo proposed two efficient signature schemes based on discrete logarithms and fact...
We present a new digital signature scheme with message recovery and its authenticated encryption bas...
In this paper, we present another tree-structure signature scheme based on discrete logarithm proble...
[[abstract]]Laih and Kuo proposed two efficient signature schemes based on discrete logarithms and f...
AbstractIn 2010, Liu et al. 1 proposed an improvement of Liu-Li digital signature scheme without one...
A secure and efficient cryptosystem can be constructed through three primary methods, the discrete l...