Open Access
Digital Signature Standard (DSS) [includes Change Notice 1 from 12/30/1996] | NIST
Reads0
Chats0
About:
The article was published on 1994-05-19 and is currently open access. It has received 127 citations till now. The article focuses on the topics: Digital Signature Algorithm & Information security.read more
Citations
More filters
Internet Key Exchange (IKEv2) Protocol
TL;DR: This document describes version 2 of the Internet Key Exchange (IKE) protocol, which does not interoperate with version 1, but it has enough of the header format in common that both versions can unambiguously run over the same UDP port.
Book ChapterDOI
A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks
TL;DR: This chapter provides a survey of attacks and countermeasures in MANET and puts forward an overview of MANET intrusion detection systems (IDS), which are reactive approaches to thwart attacks and used as a second line of defense.
Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)
TL;DR: This document describes new key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol and specifies the use of Elliptica Curve Diffie-Hellman (ECDH) key agreement in a TLS handshake and the useof ElliptIC Curve Digital Signature Algorithm (ECDSA) as a new authentication mechanism.
Journal ArticleDOI
Practical Cryptographic Civil GPS Signal Authentication
TL;DR: A practical technique is proposed to authenticate civil GPS signals that combines cryptographic authentication of the GPS navigation message with signal timing authentication based on statistical hypothesis tests to secure civil GPS receivers against spoofing attacks.
BookDOI
Fault Analysis in Cryptography
Marc Joye,Michael Tunstall +1 more
TL;DR: This book deals with side-channel analysis and its relevance to fault attacks, which is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering.
References
More filters
Internet Key Exchange (IKEv2) Protocol
TL;DR: This document describes version 2 of the Internet Key Exchange (IKE) protocol, which does not interoperate with version 1, but it has enough of the header format in common that both versions can unambiguously run over the same UDP port.
Book ChapterDOI
A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks
TL;DR: This chapter provides a survey of attacks and countermeasures in MANET and puts forward an overview of MANET intrusion detection systems (IDS), which are reactive approaches to thwart attacks and used as a second line of defense.
Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)
TL;DR: This document describes new key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol and specifies the use of Elliptica Curve Diffie-Hellman (ECDH) key agreement in a TLS handshake and the useof ElliptIC Curve Digital Signature Algorithm (ECDSA) as a new authentication mechanism.
BookDOI
Fault Analysis in Cryptography
Marc Joye,Michael Tunstall +1 more
TL;DR: This book deals with side-channel analysis and its relevance to fault attacks, which is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering.
Journal ArticleDOI
Known Vulnerabilities of Global Navigation Satellite Systems, Status, and Potential Mitigation Techniques
TL;DR: The core operation principles of satellite navigation are outlined to describe those kind of interference and to analyze the impacts to describe the large impact of a potential disruption of the GNSS service.