Abstract
This chapter takes a closer look at applications of the RSA function in signature schemes. We first discuss the security of RSA signatures that pad messages with redundancy or use the “hash-and-sign” paradigm. Finally, we introduce provably secure signature schemes and present some special signature applications.
Contradiction is not a sign of falsity, nor the lack of contradiction a sign of truth.—Blaise Pascal
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer Science+Business Media New York
About this chapter
Cite this chapter
Katzenbeisser, S. (2001). RSA Signatures. In: Recent Advances in RSA Cryptography. Advances in Information Security, vol 3. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-1431-2_8
Download citation
DOI: https://doi.org/10.1007/978-1-4615-1431-2_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4613-5550-2
Online ISBN: 978-1-4615-1431-2
eBook Packages: Springer Book Archive