18

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search

Footnote 18

For a more thorough examination of properties desirable in a digital signature, see generally Bruce Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C §2.6, 33-40 (2d ed. 1996) (hereinafter "Schneier"); Mitchell, Piper & Wild, Digital Signatures, in Contemporary Cryptology: The Science of Information Integrity 325, 341-46 (Gustavas Simmons ed., 1991).