Citations in impact factor journals
A new digital signature scheme based on factoring and discrete logarithms International Journal of Computer Mathematics Vol. 81, Issue 1, 9, 2004 |
Citation to this article as recorded by
Liu, C., Y. Zhou, Y. Xiao and G. Sun, 2011. Encryption algorithm of RSH (round sheep hash). Inform. Technol. J., 10: 686-690. CrossRefDirect Link |
Nikooghadam, M., M.R. Bonyadi, E. Malekian and A. Zakerolhosseini, 2008. A protocol for digital signature based on the elliptic curve discrete logarithm problem. J. Applied Sci., 8: 1919-1925. CrossRefDirect Link |
Citation to this article as recorded by
Batch verification of Digital Signatures: Approaches and
challenges Journal of Information Security and Applications |
Generalization of proxy signature-based on discrete
logarithms Computers & Security Vol. 22, Issue 3, 245, 2003 |
A new multi-stage secret sharing scheme using one-way function ACM SIGOPS Operating Systems Review Vol. 39, Issue 1, 48, 2005 |
Encryption Algorithm of RSH (Round Sheep Hash) Information Technology Journal Vol. 10, Issue 3, 686, 2011 |
How to cite this article
Min-Shiang Hwang, Cheng- Chi Lee and Eric Jui- Lin Lu, 2001. Cryptanalysis of the Batch Verifying Multiple DSA-Type Digital Signature. Journal of Applied Sciences, 1: 287-288.
DOI: 10.3923/jas.2001.287.288
URL: https://scialert.net/abstract/?doi=jas.2001.287.288
DOI: 10.3923/jas.2001.287.288
URL: https://scialert.net/abstract/?doi=jas.2001.287.288