Local multiscale frequency and bandwidth estimation

H Knutsson, CF Westin… - Proceedings of 1st …, 1994 - ieeexplore.ieee.org
This paper describes a robust algorithm for estimation of local signal frequency and
bandwidth. The method is based on combining local estimates of instantaneous frequency …

A family of fast syndrome based cryptographic hash functions

D Augot, M Finiasz, N Sendrier - … on Cryptology in Malaysia, Kuala Lumpur …, 2005 - Springer
Recently, some collisions have been exposed for a variety of cryptographic hash functions
[20, 21] including some of the most widely used today. Many other hash functions using …

On the security of some proxy blind signature schemes

HM Sun, BT Hsieh, SM Tseng - Journal of systems and software, 2005 - Elsevier
A proxy blind signature scheme is a digital signature scheme which combines the properties
of proxy signature and blind signature schemes. Recently, Tan et al. proposed two proxy …

ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings

X Li, K Chen - Applied Mathematics and Computation, 2005 - Elsevier
In electronic world, proxy signature is a solution of delegation of signing capabilities. Proxy
signatures can combine other special signatures to obtain some new types of proxy …

User-space communication: A quantitative study

S Araki, A Bilas, C Dubnicki, J Edler… - SC'98: Proceedings …, 1998 - ieeexplore.ieee.org
Powerful commodity systems and networks offer a promising direction for high performance
computing because they are inexpensive and they closely track technology progress …

[PDF][PDF] ID-based multi-proxy signature and blind multisignature from bilinear pairings

X Chen, F Zhang, K Kim - Proceedings of KIISC, 2003 - Citeseer
Multi-proxy signature allows the original signer delegate his singing power to a group of
proxy signers. Blind proxy-signature allows the user to obtain a signature of a message from …

Designated verifier proxy signature scheme with message recovery

R Lu, Z Cao - Applied Mathematics and Computation, 2005 - Elsevier
Proxy signature is an active cryptographic research area. In recent years, many proxy
signature schemes to suggest improvement and generalization of existing protocols have …

Algorithms and approaches of proxy signature: A survey

ML Das, A Saxena, DB Phatak - arxiv preprint cs/0612098, 2006 - arxiv.org
arxiv:cs/0612098v1 [cs.CR] 20 Dec 2006 Page 1 arxiv:cs/0612098v1 [cs.CR] 20 Dec 2006
Algorithms and Approaches of Proxy Signature: A Survey MANIK LAL DAS Dhirubhai Ambani …

Blockchain applications beyond the cryptocurrency casino: The Punishment not Reward blockchain architecture

R Banach - Concurrency and Computation: Practice and …, 2021 - Wiley Online Library
The Bitcoin model originated blockchain architectures and inspired their further
development. Blockchain architectures are still most commonly associated with currency …

Provable secure identity‐based multi‐proxy signature scheme

RA Sahu, S Padhye - International Journal of Communication …, 2015 - Wiley Online Library
Multi‐proxy signature is one of the useful primitives of the proxy signature. Till now, only a
few schemes of identity‐based multi‐proxy signature (IBMPS) have been proposed using …