<--- Back to Details
First PageDocument Content
Cryptography / FIPS 201 / Standards / Computer access control / Authentication / Smart card / PIV / Public-key cryptography / Cryptographic key types / RSA Security
Date: 2016-02-16 14:47:45
Cryptography
FIPS 201
Standards
Computer access control
Authentication
Smart card
PIV
Public-key cryptography
Cryptographic key types
RSA Security

Interfaces for Personal Identity Verification

Add to Reading List

Source URL: nvlpubs.nist.gov

Download Document from Source Website

File Size: 1,75 MB

Share Document on Facebook

Similar Documents

For Release ECI® Announces LightSEC™ Cyber Security Solution for Smart Grid - Protects Utilities from Current and Future Cyber Security Threats ECI will be showcasing its LightSEC solution at RSA 2016 in San Francisco

DocID: 1uB3a - View Document

On the Security of Multi-prime RSA M. Jason Hinek David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada

DocID: 1tovj - View Document

SECURITY INNOVATION N TR U Q UAN TUM-SAFE , S T AN DA R DIZ ED C R Y PTO Quantum computing will immediately break the most commonly used asymmetric crypto solutions in the market today – RSA and ECC. Quantum-proof cry

DocID: 1tcOk - View Document

An Improved Attack for Recovering Noisy RSA Secret Keys and its Countermeasure Noboru Kunihiro The University of Tokyo, Japan November 24th, 2015

DocID: 1sln6 - View Document

Cryptography / Ciphertext indistinguishability / Semantic security / Malleability / Advantage / Chosen-ciphertext attack / Chosen-plaintext attack / Encryption / RSA / Probabilistic encryption / Optimal asymmetric encryption padding

Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

DocID: 1rlwp - View Document