answersLogoWhite

0


Best Answer

I believe so. It's like an old penny, the older it is the more it's worth.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Are certain celebrities signatures worth much. I met Robert Plant who gave me his signature and always thought this would be worth loads later in life.?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What does signature design mean?

A signature design is usually a design that is recognized as being made by an artist famous for a certain kind of design. It is also a name used by several design businesses, such a Signature Design T-shirts or Signature Design cabinets. I was surprised to find out that there are there even famous rug designers who are well known in their field, and their rugs are known as signature rugs.


What do celebrities feel like when they go to the bathroom?

I don't think they put much thought into it.


How do you add a signature on the Samsung epic?

From home screen go into e-mail. Once in e-mail choose which account (if you have more than one). Once account is chosen pick options tab (on outside of screen) or (options key on keyboard). Next choose account settings from screen. From there go to signatures. ^^This way up here is only a signature for your e-mail. (Most people are talking about signature for sending text messages and i actually searched all over my Samsung Epic & was not successful. But then i thought doesnt this thing have an app for pretty much everything right? So I went to the android market on my phone and typed in signatures & came up with this one app called "Go Sms Pro" Its a texting application and you can customize just about anyting! You can get a signature for one thing. You can customize the background the color of your words the handwriting style. just about anything!


Do any celebrities have a clubpenguin?

No, unless they're like 9 and under or something.. even thought im 11 i still play it :(


Why did Tiim Duncan leave signature sound?

Ernie thought he was gay. Read that on another site. Dont know if thats true or not


What is the history of digital signature?

In the famous paper "New Directions in Cryptography", Whitfield Diffie and Martin Hellman first described the notion of a digital signature scheme, although they only conjectured that such schemes existed.[5][6] Soon afterwards, Ronald Rivest, Adi Shamir, and Len Adleman invented the RSA algorithm that could be used for primitive digital signatures[7]. (Note that this just serves as a proof-of-concept, and "plain" RSA signatures are not secure.) The first widely marketed software package to offer digital signature was Lotus Notes 1.0, released in 1989, which used the RSA algorithm. Basic RSA signatures are computed as follows. To generate RSA signature keys, one simply generates an RSA key pair containing a modulus N that is the product of two large primes, along with integers e and d such that e d = 1 mod φ(N), where φ is the Euler phi-function. The signer's public key consists of N and e, and the signer's secret key contains d. To sign a message m, the signer computes σ=md mod N. To verify, the receiver checks that σe = m mod N. As noted earlier, this basic scheme is not very secure. To prevent attacks, one can first apply a cryptographic hash function to the message m and then apply the RSA algorithm described above to the result. This approach can be proven secure in the so-called random oracle model. Other digital signature schemes were soon developed after RSA, the earliest being Lamport signatures[8], Merkle signatures (also known as "Merkle trees" or simply "Hash trees")[9], and Rabin signatures[10]. In 1984, Shafi Goldwasser, Silvio Micali, and Ronald Rivest became the first to rigorously define the security requirements of digital signature schemes[11]. They described a hierarchy of attack models: # In a key-onlyattack, the attacker is only given the public verification key. # In a known message attack, the attacker is given valid signatures for a variety of messages known by the attacker but not chosen by the attacker. # In a chosen message attack, the attacker first learns signatures on arbitrary messages of the attacker's choice. They also describe a hierarchy of attack results: # A total break results in the recovery of the signing key. # A universal forgery attack results in the ability to forge signatures for any message. # A selective forgery attack results in a signature on a message of the adversary's choice. # An existential forgery merely results in some valid message/signature pair not already known to the adversary. They also present the GMR signature scheme, the first that can be proven to prevent even an existential forgery against a chosen message attack.[11] Most early signature schemes were of a similar type: they involve the use of a trapdoor permutation, such as the RSA function, or in the case of the Rabin signature scheme, computing square modulo composite n. A trapdoor permutation family is a family of permutations, specified by a parameter, that is easy to compute in the forward direction, but is difficult to compute in the reverse direction. However, for every parameter there is a "trapdoor" that enables easy computation of the reverse direction. Trapdoor permutations can be viewed as public-key encryption systems, where the parameter is the public key and the trapdoor is the secret key, and where encrypting corresponds to computing the forward direction of the permutation, while decrypting corresponds to the reverse direction. Trapdoor permutations can also be viewed as digital signature schemes, where computing the reverse direction with the secret key is thought of as signing, and computing the forward direction is done to verify signatures. Because of this correspondence, digital signatures are often described as based on public-key cryptosystems, where signing is equivalent to decryption and verification is equivalent to encryption, but this is not the only way digital signatures are computed. Used directly, this type of signature scheme is vulnerable to a key-only existential forgery attack. To create a forgery, the attacker picks a random signature σ and uses the verification procedure to determine the message mcorresponding to that signature.[12] In practice, however, this type of signature is not used directly, but rather, the message to be signed is first hashed to produce a short digest that is then signed. This forgery attack, then, only produces the hash function output that corresponds to σ, but not a message that leads to that value, which does not lead to an attack. In the random oracle model, this hash-and-decrypt form of signature is existentially unforgeable, even against a chosen-message attack.[6] There are several reasons to sign such a hash (or message digest) instead of the whole document. * For efficiency: The signature will be much shorter and thus save time since hashing is generally much faster than signing in practice. * For compatibility:Messages are typically bit strings, but some signature schemes operate on other domains (such as, in the case of RSA, numbers modulo a composite number N). A hash function can be used to convert an arbitrary input into the proper format. * For integrity: Without the hash function, the text "to be signed" may have to be split (separated) in blocks small enough for the signature scheme to act on them directly. However, the receiver of the signed blocks is not able to recognize if all the blocks are present and in the appropriate order.


Why do caveman paint their left hand on the wall?

Cavemen likely painted their left hand on walls as a form of artistic expression or as a way to leave a personal mark or signature in the caves they inhabited. It could have also held symbolic or ritualistic significance in their culture.


What does the Federalist Papers signature mean?

Written during America's Founding Period, the 'Federalist Papers' publications were the result of a collaboration of intellectuals (and statesmen) but featured the habitual signature of 'Publius.' This signature refers to a legendary Roman aristocrat and political reformer, Publius Valerius Publicola (c. 500 BC/BCE), who is thought to have founded the Roman Republic.


Human thought and lifestyle within a certain time period or place is known as a... What?

Culture


Human thought and lifestyle within a certain time period or place is known as?

Culture


Why is Christian Beadles verified on Twitter isn't that just for celebrities?

He's fairly known and he has made a name of himself [due to Justin Bieber] so yeah, maybe twitter thought he desevrved it.


You have always thought that followers of a certain faith were narrow-minded. But you visited one of their churches and found that wasn't so. You had to adjust what you thought about this faith. This is an example of?

cognitive dissonance.