Back to Results
First PageMeta Content
Kerberos / Key / Certificate authority / Symmetric-key algorithm / ID-based encryption / Cryptographic key types / Cryptography / Key management / Public-key cryptography


This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi
Add to Reading List

Document Date: 2011-07-10 02:35:13


Open Document

File Size: 332,48 KB

Share Result on Facebook
UPDATE