Sequential Digital Signatures for Cryptographic Software-Update Authentication.
Bertram PoetteringSimon RastikianPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- digital signature
- public key cryptography
- security mechanisms
- smart card
- digital watermarking
- public key
- public key infrastructure
- trusted third party
- key management
- security analysis
- elliptic curve
- private key
- authentication protocol
- signature scheme
- access control
- computer systems
- software development
- data integrity
- software systems
- key distribution
- resource constrained
- security requirements
- security issues
- security protocols
- operating system
- rfid tags
- security services
- wireless sensor networks
- security model
- software architecture
- provably secure
- end to end