Abstract
This standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital signature as evidence in demonstrating to a third party that the signature was, in fact, generated by the claimed signatory. This is known as non-repudiation since the signatory cannot easily repudiate the signature at a later time.
Funder
National Institute of Standards and Technology
Information Technology Laboratory
Publisher
National Institute of Standards and Technology (U.S.)
Cited by
25 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An optimized hybrid encryption framework for smart home healthcare: Ensuring data confidentiality and security;Internet of Things;2024-10
2. In-line rate encrypted links using pre-shared post-quantum keys and DPUs;Scientific Reports;2024-09-11
3. Towards Post-Quantum Verifiable Credentials;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
4. Digital Signatures for Authenticating Compressed JPEG Images;Proceedings of the 1st Workshop on Security-Centric Strategies for Combating Information Disorder;2024-07
5. Efficient and Side-Channel Resistant Ed25519 on ARM Cortex-M4;IEEE Transactions on Circuits and Systems I: Regular Papers;2024-06