Безопасность информационных технологий (Mar 2011)
Comparison of the Algorithms by Kutter and Bruyndockx
Abstract
Digital signature implementation is the important task of the information security. The optimal implementation and extraction digital signature algorithm is necessary for solving this task. This paper presents the results of the comparison of Kutter’s and Bruyndockx’s algorithms.