passing through computer networks, especially Internet. The asymmetric cryptography, the
cryptography based on elliptic curves and more recently digital signature appear as credible
alternatives to guarantee the authenticity, non forgery, non reuse, inalterability and
irrevocability of electronic documents. In this paper, we evaluated the performance of
document security systems by the digital signature. We perform tests that showed elliptic …