The XML Signature specification defines a set of algorithms to be used to ensure security and application inter-operability for content signed using an XML Signature. In this paper we propose two ways to use and disseminate newly defined, or custom, transformation algorithms to address a limitation with XML Signatures arising from their extensibility. This involves downloading the algorithm on-demand and embedding the algorithm in the signature itself. Finally, we highlight a possible vulnerability to attack in the existing XML Signature Core Validation process when using newly defined, or custom transforms, and suggest an extension to the XML Signature standard to remedy this.