Open Access
Issue
ITM Web Conf.
Volume 73, 2025
International Workshop on Advanced Applications of Deep Learning in Image Processing (IWADI 2024)
Article Number 03009
Number of page(s) 5
Section Blockchain, AI, and Technology Integration
DOI https://doi.org/10.1051/itmconf/20257303009
Published online 17 February 2025
  1. R. Kaur, A. Kaur, Digital Signature, in Proceedings of 2012 International Conference on Computing Sciences, IEEE (2012), 295-301 [Google Scholar]
  2. C. Nist, The digital signature standard. Communications of the ACM, 35(7) (1992), 36-40 [CrossRef] [Google Scholar]
  3. M. Pooja, M. Yadav, Digital signature. International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), 3(6) (2018), 71-75 [Google Scholar]
  4. D. Naccache, D. M’RaÏhi, S. Vaudenay & D. Raphaeli, Can D.S.A. be improved? — Complexity trade-offs with the digital signature standard —. In: A. De Santis (Ed.), Advances in Cryptology — EUROCRYPT’94, Lecture Notes in Computer Science, 950, Springer, Berlin, Heidelberg (1995) [Google Scholar]
  5. D. Boneh, Twenty Years of Attacks on the RSA Cryptosystem. Notices of the AMS, 46 (1999), 203-213 [Google Scholar]
  6. L. Lawrence, R. Shreelekshmi, Edwards curve digital signature algorithm for video integrity verification on blockchain framework. Science & Justice, 64(4) (2024), 367-376 [CrossRef] [Google Scholar]
  7. National Institute of Standards and Technology, Digital Signature (DSS). Department of Commerce, Washington, D.C., Federal Information Processing Standards Publications (FIPS) NIST FIPS (2023), 186-5 [Google Scholar]
  8. M. Battagliola, A. Galli, R. Longo, A. Meneghetti, A Provably-Unforgeable Threshold Schnorr Signature With an Offline Recovery Party, In Ceur Workshop Proceedings, 3166 (2022), 60-76 [Google Scholar]
  9. J. K. Zinzindohoué, K. Bhargavan, J. Protzenko , B. Beurdouche, HACL*: A verified modern cryptographic library, in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (2017), 1789-1806 [Google Scholar]
  10. M. Ammann, L. Hirschi, S. Kremer, Dy fuzzing: formal Dolev-Yao models meet cryptographic protocol fuzz testing, in Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP), IEEE (2024), 1481-1499 [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.