Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Elaine B. Barker;|
|Title:||Digital Signature Standard (DSS)|
|Published:||July 19, 2013|
|Abstract:||This Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital signature as evidence in demonstrating to a third party that the signature was, in fact, generated by the claimed signatory. This is known as non-repudiation, since the signatory cannot easily repudiate the signature at a later time. [Supersedes FIPS 186-3 (June 2009): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902984]|
|Citation:||Federal Inf. Process. Stds. (NIST FIPS) - 186-4|
|Keywords:||computer security, cryptography, digital signatures, Federal Information Processing Standards, public key cryptography|
|Research Areas:||Information Technology, Computer Security|