Cryptographic protocols

Results: 3642



#Item
911Commitment scheme / Universal composability / Oblivious transfer / Semantic security / RSA / Diffie–Hellman key exchange / Communications protocol / Cipher / Cryptography / Cryptographic protocols / ID-based encryption

An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Springer-Verlag, 2007. This is the full versio

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-02 11:56:16
912Cryptographic protocols / Computational complexity theory / Proof theory / Complexity classes / Combinatorics / Interactive proof system / IP / Soundness / Non-interactive zero-knowledge proof / Theoretical computer science / Cryptography / Applied mathematics

Basing Non-Interactive Zero-Knowledge on (Enhanced) Trapdoor Permutations: The State of the art Oded Goldreich Abstract. The purpose of this article is to correct the inaccurate account of this subject that is provided

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2010-07-22 08:07:12
913Marketing / Technology / Cryptographic protocols / Web development / Online shopping / Electronic money / E-commerce payment system / Invoice / Credit card / Electronic commerce / Business / Payment systems

Development of a Secure Electronic Marketplace for Europe Michael Waidner IBM Zurich Research Laboratory CH 8803 Rüschlikon, Switzerland e-mail <>

Add to Reading List

Source URL: www.semper.org

Language: English - Date: 2011-10-26 07:11:07
914Computing / Security / Internet protocols / Electronic commerce / Internet standards / Transport Layer Security / Cipher suite / Chosen-ciphertext attack / Man-in-the-middle attack / Cryptography / Secure communication / Cryptographic protocols

Analysis of the SSL 3.0 protocol David Wagner University of California, Berkeley Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
915Secure communication / Key management / Public-key cryptography / Electronic commerce / HTTP Secure / Transport Layer Security / Stunnel / SSL acceleration / Load balancing / Cryptography / Computing / Cryptographic protocols

Recent work in OpenBSD relayd SSL Interception and other Advancements Reyk Floeter () March 2013 Abstract

Add to Reading List

Source URL: www.obsd.si

Language: English - Date: 2013-04-02 16:02:24
916Internet / Internet standards / HTTP / MIME / Cryptographic protocols / Internet media type / DomainKeys Identified Mail / Cypherpunk anonymous remailer / Computing / Email / OSI protocols

Memory Hole: Cryptographic protection for e-mail headers Daniel Kahn Gillmor <> IETF 92 Dallas, March 2015

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2015-03-22 21:24:43
917Key management / HTTP / Secure communication / X.509 / Public key certificate / Internet Information Services / HTTP Secure / Form / Thawte / Cryptography / Public-key cryptography / Cryptographic protocols

Visual Intercept Tech Tip - How to Configure a Visual Intercept Web site as a Secure Site

Add to Reading List

Source URL: www.elsitech.com

Language: English - Date: 2014-01-31 12:54:24
918Cryptographic protocols / Electronic commerce / Error detection and correction / Public key certificate / X.509 / Root certificate / Transport Layer Security / Hash tree / Digital signature / Cryptography / Public-key cryptography / Key management

Internet Engineering Task Force (IETF) Request for Comments: 6962 Category: Experimental ISSN: B. Laurie

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2013-06-06 16:56:32
919Computing / Technology / Wi-Fi / Wireless / Computer network security / Ralink / Wi-Fi Protected Access / Wireless access point / Linksys / Cryptographic protocols / Wireless networking / IEEE 802.11

RTOS Innovators smxWiFi™ MAC smxWiFi is a robustMedia Access Control (MAC) stack specifically designed and developed for embedded systems. It is written in C and can run on any hardware platform. While

Add to Reading List

Source URL: www.smxrtos.com

Language: English - Date: 2014-03-27 16:54:49
920Tunneling protocols / Data / Computer network security / Internet protocols / IPsec / Network protocols / Internet security / Internet Security Association and Key Management Protocol / Point-to-Point Tunneling Protocol / Computing / Cryptographic protocols / Network architecture

A Cryptographic Evaluation of IPsec Niels Ferguson? and Bruce Schneier?? Counterpane Internet Security, Inc., 3031 Tisch Way, Suite 100PE, San Jose, CAhttp://www.counterpane.com

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
UPDATE