News

  • Preparations for the XXVI international professional conference Information Security Summit - IS2 under the title "DIGITAL OPTIMISM" are in full progress. The conference will be held on June 3-4, 2025 in the beautiful Ceremonial Hall of the Czech Technical University in Prague Bethlehem Chapel in Prague. More information HERE...

  • Recordings of selected presentations from last year's IS2 2024 Conference - 29-30 May 2024 - "25 years of IS2 - A SAFE AND DIGITAL SOCIETY" are available. More information HERE...

  • The IS2 2024 conference hosted the panel discussion on "Being Prepared". The accompanying videos with the views of eminent personalities are still available. More information HERE...

back  Back to programme...

 

DANILO GLIGOROSKI

Danilo Gligoroski is a professor of Information Security and Cryptography at the Department of Telematics, at the Norwegian University of Science and Technology – Trondheim, Norway. He received his Ph.D. at the Cyril and Methodius’ University of Skopje in 1997 in the field of Computer Science. His research interests are Cryptography, Computer Security, Discrete algorithms, Information Theory and Coding.

 

BOTTLENECKS IN APPLIED DIGITAL SIGNATURES SCHEMES

A classical way for allocating bottlenecks in digital signature schemes is to measure the efficiency of the signing and the verification parts. For example, if the process is such that the company server receives a lot of signed transactions from individual clients and have to verify every signature, then an obvious choice would be to use a signature schneme that can do faster verification, while the individual signatures can be produced in a somewhat slower manner (RSA signatures with small public exponents have that property). On the other hand, if a company needs to send a bulk of signed invoices to hundreds of thousands (or millions) of users, then the signing speed is important (elliptical curve signature schemes are usually faster in signing than RSA or DSA signature schemes). However, with the advent of new standards and new technological advancements in medical equipment, especially in real-time teleradiology and mammography, the issue of whether the signing or verification is fast or slow does not at all influence the efficiency of the overall signature scheme. There, the speed of the used hash function is the real bottleneck, taking even up to 99.7% of the time spent on signing or verification. In his talk he will demonstrate several use case scenarios with several typical average sizes, starting from 16 KB (typical PDF files in financial transactions) up to files with a size of 160 MB – images obtained by mammographic scanners. Additionally, from the same perspective He will gives a what-if analysis that includes several new cryptographic hash functions from the ongoing SHA-3 competition.

What interests you?

sliva 2017 1

DSM Magazine

DSM is a professional quarterly magazine focused on information security and data protection problematics. Our goal is to provide an up-to- date overview of development trends in broader context.

More...

is2 20 let

Conference IS2

Prestigious international conference on information security, organized under the auspices of prominent representatives of the Czech government and other important personalities..

More...

 
 

Partnerská společnost
icz logo banner small v2

Na naší webové stránce používáme cookies. Některé z nich jsou nutné pro běh stránky, zatímco jiné nám pomáhají vylepšit vlastnosti stránky na základě uživatelských zkušeností (tracking cookies). Sami můžete rozhodnout, zda cookies povolíte. Mějte prosím na paměti, že při odmítnutí, nemusí být stránka zcela funkční.

Back to top