Abstract
A tutorial on digital signatures is presented, covering the basic concepts of public-key cryptography and digital signatures based on public-key techniques. Applications are discussed, including key management for conventional encryption equipment, electronic mail and data interchange, access control and audit trails, software verification and virus detection, counterfeit-proof currency, nuclear test ban treaty detectors, and challenge response systems such as in aircraft identification of friend or foe.

This publication has 0 references indexed in Scilit: