Time-stamping services produce time-stamp tokens as evidences to prove that digital data existed at given points in time. Time-stamp tokens contain verifiable cryptographic bindings between data and time, which are produced using cryptographic algorithms. In the ANSI, ISO/IEC and IETF standards for time-stamping services, cryptographic algorithms are addressed in two aspects: (i) Client-side hash functions used to hash data into digests for nondisclosure. (ii) Server-side algorithms used to bind the time and digests of data. These algorithms are associated with limited lifespans due to their operational life cycles and increasing computational powers of attackers. After the algorithms are compromised, time-stamp tokens using the algorithms ...
Abstract. Digital timestamping is a cryptographic technique allowing affixing a reliable date to a d...
This thesis focuses on hash-chain based protocols for time-stamping and secure logging. Any electron...
Abstract. We present a solution to the high availability issue that arises when digital time-stampin...
Time-stamping services produce time-stamp tokens as evidences to prove that digital data existed at ...
Time-stamping services are used to prove that a data item existed at a given point in time. This pro...
Commonly used digital signature schemes have a limited lifetime because their security is based on c...
Digital signatures are a powerful tool for demonstrating data integrity and performing source authen...
To establish that a document was created after a given moment in time, it is necessary to report eve...
International audienceTime-stamping is a technique used to prove the existence of a digital document...
International audienceThe aim of a time-stamping system is to prove the existence of a digital docum...
Abstract. We study the influence of collision-finding attacks on the security of time-stamping schem...
[[abstract]]To ensure integrity and originality of digital information, digital signatures were prop...
Abstract. It is almost a folklore-knowledge that hash-based time-stamping schemes are secure if the ...
We propose a generic modelling technique that can be used to extend existing frameworks for theoreti...
[[abstract]]To ensure integrity and originality of digital information, digital signatures were prop...
Abstract. Digital timestamping is a cryptographic technique allowing affixing a reliable date to a d...
This thesis focuses on hash-chain based protocols for time-stamping and secure logging. Any electron...
Abstract. We present a solution to the high availability issue that arises when digital time-stampin...
Time-stamping services produce time-stamp tokens as evidences to prove that digital data existed at ...
Time-stamping services are used to prove that a data item existed at a given point in time. This pro...
Commonly used digital signature schemes have a limited lifetime because their security is based on c...
Digital signatures are a powerful tool for demonstrating data integrity and performing source authen...
To establish that a document was created after a given moment in time, it is necessary to report eve...
International audienceTime-stamping is a technique used to prove the existence of a digital document...
International audienceThe aim of a time-stamping system is to prove the existence of a digital docum...
Abstract. We study the influence of collision-finding attacks on the security of time-stamping schem...
[[abstract]]To ensure integrity and originality of digital information, digital signatures were prop...
Abstract. It is almost a folklore-knowledge that hash-based time-stamping schemes are secure if the ...
We propose a generic modelling technique that can be used to extend existing frameworks for theoreti...
[[abstract]]To ensure integrity and originality of digital information, digital signatures were prop...
Abstract. Digital timestamping is a cryptographic technique allowing affixing a reliable date to a d...
This thesis focuses on hash-chain based protocols for time-stamping and secure logging. Any electron...
Abstract. We present a solution to the high availability issue that arises when digital time-stampin...