A course in number theory and cryptography
A course in number theory and cryptography
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Introduction to Cryptography
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Fundamentals of Computer Security
Fundamentals of Computer Security
Cryptography: An Introduction
Hi-index | 0.00 |
Consideration was given to new protocols for information authentication in the automatic control systems distinguished from the existing protocols for using the notion of collective public key calculated depending on the given subset of public keys. It was suggested to use special cases of rooting a simple modulo as a complicated computational problem underlying the cryptographic algorithms and protocols. New algorithms for digital signature, collective digital signature, and composition digital signature were founded on it. The proposed philosophy of collective digital signature was shown to be realizable on the basis of some existing digital signature algorithms. It enables one to develop protocols for simultaneous signing of contract or package of contracts by an arbitrary number of users.