Digital signature

Results: 2653



#Item
511Advantage / Random oracle / RSA / Parity of a permutation / ElGamal signature scheme / Cryptography / Public-key cryptography / Digital signature

Verifiably Committed Signatures Provably Secure in The Standard Complexity Model Huafei Zhu Department of Information Science and Electronics Engineering, ZheJiang University, YuQuan Campus, HangZhou, 310027, PR. China E

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-01 04:50:33
512Public-key cryptography / Encryption / Digital signature / One-time pad / Key / Probabilistic encryption / Semantic security / Cryptography / Cipher / Signcryption

Public-Key Encryption with Lazy Parties∗ Kenji Yasunaga† April 28, 2015 Abstract In a public-key encryption scheme, if a sender is not concerned about the security of a message

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-28 01:59:26
513Notary / Cryptography / Digital signature / Public key certificate / First aid / Electronic submission / Cyberwarfare / Security / Key management / Public-key cryptography / Civil law

APPLICATION TO REGISTER FIRST AID TRAINER/EXAMINER

Add to Reading List

Source URL: www.hseni.gov.uk

Language: English - Date: 2011-11-10 10:58:04
514Key management / Deniable authentication / Ring signature / Digital signature / Authenticated encryption / Zero-knowledge proof / Proof of knowledge / Cryptography / Cryptographic protocols / Public-key cryptography

Microsoft Word - DA standarden.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-20 21:30:21
515Electronic commerce / Cyberwarfare / Mathematics / Applied mathematics / Implicit certificate / Finite fields / Elliptic Curve DSA / Elliptic curve cryptography / Digital signature / Public-key cryptography / Cryptography / Key management

Security of ECQV-Certified ECDSA Against Passive Adversaries

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-03-09 14:11:31
516Hashing / Cryptographic hash functions / Trusted third party / Hash list / Hash function / Digital signature / RSA / Cryptography / Public-key cryptography / Error detection and correction

Microsoft PowerPoint - 05-Contract-Signing Protocols.ppt

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2005-01-05 04:11:06
517Bhutan / Gmail / Postage stamp / Asia / Cultural history / Civil law / Thimphu / Digital signature

Tashi InfoComm Ltd. POST-PAID OWNERSHIP TRANSFER FORM Mobile No----------------------Previous Owner: New Owner:

Add to Reading List

Source URL: tashicell.com

Language: English - Date: 2014-03-30 23:48:54
518Public key certificate / Identity document / Digital signature / Electronic identity card / Cryptography / Key management / Public-key cryptography

NB: This is an unofficial translation! Act on Electronic Service in the AdministrationChapter 1 General provisions

Add to Reading List

Source URL: www.finlex.fi

Language: English
519RSA / Digital signature / Pavilion / Cryptography / Public-key cryptography / EMC Corporation

Microsoft Word - Partner Pavilion Rules and Regs 2015.doc

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2014-08-13 15:41:40
520Civil law / Digital signature / Key management / Notary / RSA / Model theory / Structure / Permutation / Mathematics / Public-key cryptography / Cryptography

An extended abstract of this work appeared in the proceedings of PKCThis is the full version. Tightly-Secure Signatures from Chameleon Hash Functions Olivier Blazy1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-22 09:39:13
UPDATE