<--- Back to Details
First PageDocument Content
Cryptography / FIPS 201 / Standards / Computer access control / Authentication / Smart card / PIV / Public-key cryptography / Cryptographic key types / RSA Security
Date: 2016-02-16 14:47:45
Cryptography
FIPS 201
Standards
Computer access control
Authentication
Smart card
PIV
Public-key cryptography
Cryptographic key types
RSA Security

Interfaces for Personal Identity Verification

Add to Reading List

Source URL: nvlpubs.nist.gov

Download Document from Source Website

File Size: 1,75 MB

Share Document on Facebook

Similar Documents

Key management / Public-key cryptography / Cryptography / Elliptic curve cryptography / Key size / Key / Symmetric-key algorithm / RSA / Cipher / Elliptic curve DiffieHellman / DiffieHellman key exchange / Cryptographic key types

CERTICOM WHITEPAPER SERIES ECC and SCADA Key Management Rob Lambert, Certicom August 2010

DocID: 1lYVJ - View Document

Cryptography / FIPS 201 / Standards / Computer access control / Authentication / Smart card / PIV / Public-key cryptography / Cryptographic key types / RSA Security

Interfaces for Personal Identity Verification

DocID: 1kQ2J - View Document

Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / Digital signature / XTR / Cryptographic protocol / Challengeresponse authentication / Security protocol notation / NeumanStubblebine protocol

Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Alan Jeffrey

DocID: 1klGo - View Document

Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / XTR / Digital signature / Subtyping / Security protocol notation

Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Cambridge, UK Alan Jeffrey

DocID: 1jpet - View Document

Kerberos / Key / Certificate authority / Symmetric-key algorithm / ID-based encryption / Cryptographic key types / Cryptography / Key management / Public-key cryptography

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

DocID: 19fDT - View Document