First Page | Document Content | |
---|---|---|
![]() Date: 2016-02-16 14:47:45Cryptography FIPS 201 Standards Computer access control Authentication Smart card PIV Public-key cryptography Cryptographic key types RSA Security | Add to Reading List |
![]() | CERTICOM WHITEPAPER SERIES ECC and SCADA Key Management Rob Lambert, Certicom August 2010DocID: 1lYVJ - View Document |
![]() | Interfaces for Personal Identity VerificationDocID: 1kQ2J - View Document |
![]() | Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Alan JeffreyDocID: 1klGo - View Document |
![]() | Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Cambridge, UK Alan JeffreyDocID: 1jpet - View Document |
![]() | This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followiDocID: 19fDT - View Document |