SECURE TEMPLATE GENERATION USING NON-INVERTIBLE TRANSFORMFOR ONLINE MOBILE SIGNATURE VERIFICATION
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 10
Abstract
The theme possesses the novel property of being strong against AN adjust chosen-message attack: AN somebody UN agency receives signatures for messages of his alternative (where every message could also be chosen during a manner that depends on the signatures of antecedently chosen messages) cannot later forge the signature of even one further message. Therefore target is to construct a signature theme with such properties supported the existence of a "claw-free" combine of permutations--a doubtless weaker assumption than the trait of number factoring.
Authors and Affiliations
Sonika Sharma*
DESIGN AND MODELLING HILBERT TRANSFORM BASED PHASE DETECTOR FOR ALL DIGITAL PHASE LOCKED LOOP
The Phase Locked Loop (PLL) is an almost always used electronics circuit for communication systems like modulator, demodulator, frequency generator and frequency synthesizer etc. All-digital phase locked loop (ADP...
AN EXPERIMENTAL STUDY ON GEO-POLYMER CONCRETE INCORPORATING GGBS (GROUND GRANULATED BLAST FURNANCE SLAG) AND METAKAOLIN
The major problem the world is facing today is the environmental pollution. In the construction industry mainly the production of Portland cement will causes the emission of pollutants results in environmental poll...
Low Power Counter Measure for Cryptographic Applications using Asynchronous S-Box
In this work, a novel asynchronous combinational S-Box (substitution box) design for AES (Advanced Encryption Standard) cryptosystems is projected and validated. The S-Box is examined because the final vital comp...
Design of Modified mattresses for patient handling in Hospital
In present day, we see in maximum hospital, transfer of patient from one place to another place that time require maximum labor work. during patient handling, patient and hospital staff suffers from many problems...
A Survey on Various Methodologies of Hiding Association Rules for Privacy Preserving
Data mining is the useful technology to extract information or knowledge from large database. However, misuse of this technology may lead to the disclosure of sensitive information. Privacy preserving data mining...