Opportunities for genetic improvement of cryptographic code
Abstract
References
Index Terms
- Opportunities for genetic improvement of cryptographic code
Recommendations
Improvement of identity-based proxy multi-signature scheme
A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer, a company or an organization. A proxy multi-signature scheme is an extension of the basic proxy signature scheme, and permits two or more original signers ...
Improvement on Meshram et al.'s ID-based cryptographic mechanism
Meshram et al. proposed an ID-based cryptosystem based on the generalized discrete logarithm problem (GDLP) and the integer factorization problem (IFP) in 2012, and their contribution lies in that they firstly proposed an idea to construct the ID-based ...
Cryptographic tamper evidence
CCS '03: Proceedings of the 10th ACM conference on Computer and communications securityWe propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div can determine whether one of them was generated by the forger. ...
Comments
Information & Contributors
Information
Published In

Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 27Total Downloads
- Downloads (Last 12 months)2
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in