1. Is there a standard padding/format for RSA Blind Signatures?

  2. Example of existentially unforgeable and identity of the signer
  3. What is the advantage of digital signatures over message authentication codes?
  4. Most Compact Secure Post-Quantum Signatures and Public Keys?

  5. Signature for Identity Verificaton on "offline" P2P network
  6. What is an approximate length for a digital signature (SHA) in this case?

  7. Is there a cryptographic solution to provide a “proof of exclusion”?
  8. Digital Signature Algorithm signature creation?

  9. how to validate cert when signed cert has authority key id but signing cert doesn't?

  10. Should I be using PKCS1 v1.5 or PSS for RSA signatures?
  11. How robust is RSA-FDH against distribution bias?

  12. Knowing you can combine 2 signatures, Is it possible to remove part of the signature?
  13. Given 2 Digital Signature generated by $S=D\times k^r$ how do you solve for $k$?

  14. Distributed key generation + signature scheme?
  15. In HMQV, can one use multiple identities with one public key?

  16. sign data and append certificate VS sign data and certificate

  17. How can we know who sent a MAC-then-encrypt message?

  18. What type of attacks are practical for this situation?

  19. Is there a complete list of Signature Algorithm names?

  20. Verifiable computation on signed data
  21. Can the precompiles in Ethereum Byzantium for pairings be used for implementation of BLS verification?
  22. Ring Signature Verification
  23. Reasons for Chinese SM2 Digital Signature Algorithm
  24. Is the SHA-family of hash functions surjective onto their domain with each element equally likely?

  25. How to calculate Bilinear Map?

  26. What are the different uses of MAC and Digital Signature?

  27. Is it possible to derive an Ed25519-public-key from an Ed25519-signature?

  28. How should I incrementally sign a large set of documents?
  29. What hashing algorithm does RSA use?
  30. What is gpg2 algo 1 and 8 concerning its signature-procedure?
  31. Rivest's ring signatures with hashes instead of symmetric encryption

  32. What is customizable in ECDSA signature and verification?

  33. Can we use a signature of a message as an decryption key?

  34. How digital signatures work
  35. Possible Digital Signature Hack?

  36. Advantages of using intermediate hash over full hash in digital signature application

  37. How use multiple keys to sign the same document?
  38. Winternitz hash based signature signing and verification

  39. Example use case of signature using RSA

  40. Signature using RSA (as described in Cryptography engineering)

  41. Linkable Ring Signatures on Pairing-Friendly curves

  42. ElGamal signature: Forging a signature of a specific form
  43. What is the high level procedure to use ECDSA?

  44. Ring Signature - paper/code difference in trying to solve inverse trap door function?

  45. Proof of Disclosure? Is there such a thing?

  46. Would the public key of Digital Signature be replaced?

  47. Is OpenPGP used for purposes other than e-mail encryption and signing?
  48. What exactly is a digital signature?

  49. How to combine AES-CMACs

  50. What's the minimum message expansion for Digital Signature?

  51. Is it safe to include the public certificate in xml digital signatures?
  52. Asymmetric code signing also tied to a device

  53. What is the Discrete Logarithm Problem in (Z/Zp) in the DSA?

  54. Why is a CSR signed and which key is used for signing?

  55. Why don't crypto-currencies use the Lamport signature scheme?
  56. Is the RSA signature attack from Desmedt and Odlyzko practical?

  57. Does this ECIES scheme make MAC redundant?
  58. Why can't you hijack someone's public key

  59. Security of RSA signature using PKCS 1.5
  60. Why do we need to compute message digest of a message first while signing it?
  61. How to strongly reference a file that is signed twice (counter signed)
  62. Key and signature sizes of NTRU and NTRU Prime?

  63. Can we use higher strength SHA along with lower strength RSA key in SSL?

  64. RSA-PSS salt size

  65. In EC with key chaining, is it possible to verify signature made by root private key using public key of derived keypair?
  66. What is the difference between signatures and VRF?

  67. How should ECDSA handle the null hash?

  68. Schnorr signatures: multisignature support
  69. Checking a file for integrity and authentication

  70. Is allowing both digitalSignature and keyEncipherment certificate usages a bad practice?

  71. Using RSA signature as a secret material

  72. Is RSA signature as strong as the RSA encryption?

  73. Bruce Schneier, encryption, public keys and digital-signature.

  74. The parameters included in TLS 1.2 server signature in the ServerKeyExchange

  75. Is it possible to have a PAdES signature with only a timestamp?

  76. Rotatable hash-based duplicate check
  77. Tamper-proofing log files

  78. Remotely Verify File Timestamp

  79. Are there any examples of signature schemes with multiple signing keys but one verification key?

  80. DSS security in comparison to ECDSA or RSA

  81. Selective Forgery of a Digital Signature - Goldwasser et al

  82. Schnorr Digital Signature
  83. How CL-signature can act as positive & additive accumulator?
  84. Negotiate a secure connection without certificates?

  85. Public-key format for ECDSA as in FIPS 186-4?

  86. Using cryptography: How to handle this real life situation?

  87. Choice of bilinear group for implementation of BLS signature with NIWI proof?
  88. multi-theorem vs single-theorem for non-interactive zero knowledge

  89. Proving Authenticity in Attribute Based Encryption
  90. Which curve is used for ECDH
  91. Is this schema secure?
  92. Is there a way to verify an original author using encryption?

  93. Minimizing size of signed message with discrete-log scheme
  94. Is it bad to expose the public key?
  95. DSA security improvement without increasing signature size

  96. which exponent to be used for RSA e =3 or 65537 for RSASSAPSS signature verification
  97. Zero-knowledge signature verification

  98. Are there any practical implementation of a homomorphic hashing or signature scheme?

  99. Why do we need a digital signature?

  100. Signing an exchanged symmetric key that is asymmetrically encrypted