scispace - formally typeset
Open Access

Digital Signature Standard (DSS) [includes Change Notice 1 from 12/30/1996] | NIST

Reads0
Chats0
About
The article was published on 1994-05-19 and is currently open access. It has received 127 citations till now. The article focuses on the topics: Digital Signature Algorithm & Information security.

read more

Citations
More filters

Internet Key Exchange (IKEv2) Protocol

TL;DR: This document describes version 2 of the Internet Key Exchange (IKE) protocol, which does not interoperate with version 1, but it has enough of the header format in common that both versions can unambiguously run over the same UDP port.
Book ChapterDOI

A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks

TL;DR: This chapter provides a survey of attacks and countermeasures in MANET and puts forward an overview of MANET intrusion detection systems (IDS), which are reactive approaches to thwart attacks and used as a second line of defense.

Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)

TL;DR: This document describes new key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol and specifies the use of Elliptica Curve Diffie-Hellman (ECDH) key agreement in a TLS handshake and the useof ElliptIC Curve Digital Signature Algorithm (ECDSA) as a new authentication mechanism.
Journal ArticleDOI

Practical Cryptographic Civil GPS Signal Authentication

TL;DR: A practical technique is proposed to authenticate civil GPS signals that combines cryptographic authentication of the GPS navigation message with signal timing authentication based on statistical hypothesis tests to secure civil GPS receivers against spoofing attacks.
BookDOI

Fault Analysis in Cryptography

TL;DR: This book deals with side-channel analysis and its relevance to fault attacks, which is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering.
References
More filters

Internet Key Exchange (IKEv2) Protocol

TL;DR: This document describes version 2 of the Internet Key Exchange (IKE) protocol, which does not interoperate with version 1, but it has enough of the header format in common that both versions can unambiguously run over the same UDP port.
Book ChapterDOI

A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks

TL;DR: This chapter provides a survey of attacks and countermeasures in MANET and puts forward an overview of MANET intrusion detection systems (IDS), which are reactive approaches to thwart attacks and used as a second line of defense.

Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)

TL;DR: This document describes new key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol and specifies the use of Elliptica Curve Diffie-Hellman (ECDH) key agreement in a TLS handshake and the useof ElliptIC Curve Digital Signature Algorithm (ECDSA) as a new authentication mechanism.
BookDOI

Fault Analysis in Cryptography

TL;DR: This book deals with side-channel analysis and its relevance to fault attacks, which is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering.
Journal ArticleDOI

Known Vulnerabilities of Global Navigation Satellite Systems, Status, and Potential Mitigation Techniques

TL;DR: The core operation principles of satellite navigation are outlined to describe those kind of interference and to analyze the impacts to describe the large impact of a potential disruption of the GNSS service.