18: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
(New page: ==Footnote 18== For a more thorough examination of properties desirable in a digital signature, see generally Bruce Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in...)
 
m (Reverted edits by KarenSanders (talk) to last revision by Mdpeters)
 
(2 intermediate revisions by one other user not shown)
(No difference)

Latest revision as of 12:36, 16 October 2014

Footnote 18

For a more thorough examination of properties desirable in a digital signature, see generally Bruce Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C §2.6, 33-40 (2d ed. 1996) (hereinafter "Schneier"); Mitchell, Piper & Wild, Digital Signatures, in Contemporary Cryptology: The Science of Information Integrity 325, 341-46 (Gustavas Simmons ed., 1991).