Digital signature

Results: 2653



#Item
351Theoretical computer science / Quantum cryptography / Quantum computer / Post-quantum cryptography / Digital signature / Quantum algorithm / Key size / Cryptographic primitive / Elliptic curve cryptography / Cryptography / Public-key cryptography / Key management

Evaluating Post-Quantum Asymmetric Cryptographic Algorithm Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:28:55
352NTRUSign / Lattice-based cryptography / NTRU / Homomorphic encryption / Digital signature / Lattice problem / RSA / Elliptic curve cryptography / Lattice / Cryptography / Post-quantum cryptography / Public-key cryptography

Practical Lattice-based Digital Signature Schemes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:42:22
353GMR / Claw-free permutation / Digital signature / One-way function / Goldwasser–Micali cryptosystem / Silvio Micali / Quadratic residue / RSA / Binary tree / Cryptography / Public-key cryptography / Electronic commerce

Appeared in Advances in Cryptology { Crypto `86 (Proceedings), (A.M. Odlyzko ed.), Lecture Note in Computer ScienceSpringer Verlag, pages 104{110, 1987. Two Remarks Concerning the Goldwasser-Micali-Rivest Signatur

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2014-06-22 06:26:58
354Key management / Notary / Public-key cryptography / Supervisor / Cyberwarfare / Cryptography / Civil law / Digital signature

School of Mechanical Engineering HONOURS PROJECT COMPLETION FORM Successful submission of this completed form marks the end of your final year project. After the Project Exhibition please complete and return this form to

Add to Reading List

Source URL: mecheng.adelaide.edu.au

Language: English - Date: 2015-02-22 23:59:09
355Physics / Differential topology / Image processing / Digital geometry / Heat kernel signature / Shape / Manifold / Embedding / Data analysis / Mathematics / Topology / Differential geometry

CCCG 2009, Vancouver, BC, August 17–19, 2009 Intrinsic Multiscale Geometry Leonidas J. Guibas∗ Abstract

Add to Reading List

Source URL: cccg.ca

Language: English - Date: 2009-09-02 14:33:14
356Notary / Cryptography / Authorization / Digital signature / Security / Computer security / Civil law / Key management / Public-key cryptography

Clear Form Print Form UNIVERSITY OF CALIFORNIA INSTRUCTIONS: A signature authorization is a delegation of authority and remains in

Add to Reading List

Source URL: controller.ucsf.edu

Language: English - Date: 2014-03-13 17:10:10
357Finite-state machine / Digital electronics / Cryptographic hash function / Forensic science / Hash function / Digital signature / Cryptography / Electronic engineering / Automata theory

Journal of Digital Forensics, Security and Law, VolColumn: The Physics of Digital Information-Part 21 Fred Cohen

Add to Reading List

Source URL: all.net

Language: English - Date: 2012-09-01 08:58:29
358PGP / Cryptographic software / GNU Privacy Guard / Web of trust / Crypt / Digital signature / Public key fingerprint / Key / ElGamal encryption / Cryptography / Public-key cryptography / Key management

The GNU Privacy Handbook The GNU Privacy Handbook Copyright © 1999 by The Free Software Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation Li

Add to Reading List

Source URL: www.gnupg.org

Language: English - Date: 2000-08-08 10:33:16
359Notary public / ENotary / Electronic signature / Secretary of State of Arkansas / Digital signature / Signing agent / Civil law / Notary / Law

Arkansas Secretary of State Q Mark Martin Arkansas Secretary of State

Add to Reading List

Source URL: www.sos.arkansas.gov

Language: English - Date: 2015-03-23 10:16:10
360Public-key cryptography / Cryptographic protocols / Elliptic curve cryptography / Key size / Elliptic curve Diffie–Hellman / Digital signature / Elliptic Curve DSA / Diffie–Hellman key exchange / Elliptic curve / Cryptography / Key management / Finite fields

Lecture 14: Elliptic Curve Cryptography and Digital Rights Management Lecture Notes on “Computer and Network Security” by Avi Kak () April 23, :55am

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-23 00:56:33
UPDATE