Digital signature

Results: 2653



#Item
141Cryptography / Hashing / Cryptographic hash functions / Search algorithms / Public-key cryptography / Digital signature / EdDSA / Random oracle / Descriptor / Hash function / Advantage

Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper 1

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-12-12 23:20:54
142Biometrics / Computer law / Cryptography / Public-key cryptography / Signature / ESign / Electronic Signatures in Global and National Commerce Act / Electronic signature / Aadhaar / Digital signature / DigiLocker / Electronic authentication

GOVERNMENT OF INDIA Ministry of Communications & Information Technology Department of Electronics & Information Technology Controller of Certifying Authorities eSign – Online Electronic

Add to Reading List

Source URL: digilocker.gov.in

Language: English - Date: 2016-08-18 03:15:06
143Key management / Public-key cryptography / E-commerce / Records management technology / Signature / Public key certificate / Academic degree / Graduate certificate / Digital signature

Microsoft Word - Graduate Certificate Coversheet 2007.doc

Add to Reading List

Source URL: gfs.missouri.edu

Language: English - Date: 2013-02-04 11:52:05
144Digital signature / Key management / Notary / Records management technology / Signature

Microsoft Word - IS Contract Change Form.docx

Add to Reading List

Source URL: www.plymouth.edu

Language: English - Date: 2015-04-03 11:04:30
145Cryptography / Public-key cryptography / Digital signature / RSA / Ciphertext indistinguishability / Random oracle

This is the Full Version of the Extended Abstract that appears in the Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’February – 1 March 2013, Nara, Ja

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-02-21 09:51:42
146Public-key cryptography / Semantics / Inter-process communication / Communications protocol / Data transmission / Interpretation / Futures and promises / Digital signature / Logic / Language / Computing

Programming Cryptographic Protocols

Add to Reading List

Source URL: evenmere.org

Language: English - Date: 2008-06-23 13:35:58
147Cryptography / Public-key cryptography / FiatShamir heuristic / Wallet / Advantage / Accumulator / Digital signature / Coin

Practical Divisible E-Cash Patrick Märtens Mathematisches Institut, Justus-Liebig-Universität Gießen April 9, 2015

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-09 08:38:48
148E-commerce / Financial cryptography / Payment systems / Public-key cryptography / Digital currencies / Ecash / DigiCash / Blind signature / Electronic money / Cryptographic protocol / RSA / Payment

Basic Security of the ecash Payment System? Berry Schoenmakers DigiCash Kruislaan 419 NL-1098 VA Amsterdam The Netherlands

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2008-05-11 02:51:51
149Public-key cryptography / Cryptographic protocols / Secure communication / Cryptographic software / Double Ratchet Algorithm / DiffieHellman key exchange / WhatsApp / Digital signature / XTR / Elliptic curve DiffieHellman / Signal

How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2016-05-24 15:16:00
150

Position Paper How to avoid digital signature deployment & usage difficulties for eID ? April 2011

Add to Reading List

Source URL: www.eurosmart.com

Language: English - Date: 2015-10-12 03:45:58
    UPDATE