Digital signature

Results: 2653



#Item
551Certificate authority / Man-in-the-middle attack / Digital signature / Alice and Bob / Public key infrastructure / Public key certificate / RSA / Cryptography / Public-key cryptography / Key management

KEY DISTRIBUTION 1/1 The public key setting

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2014-06-02 11:33:43
552Computer vision / Vision / Differential geometry / Digital geometry / Topology / Heat kernel signature / Shape analysis / 3D modeling / 3D computer graphics software / Image processing / Imaging / Computer graphics

Eurographics Workshop on 3D Object RetrievalH. Laga, T. Schreck, A. Ferreira, A. Godil, and I. Pratikakis (Editors) SHREC’11 Track: Shape Retrieval on Non-rigid 3D Watertight Meshes Z. Lian1,2 , A. Godil1 , B.

Add to Reading List

Source URL: reuter.mit.edu

Language: English - Date: 2011-05-09 11:00:13
553Cryptographic hash functions / Electronic commerce / Certificate policy / SHA-1 / SHA-2 / Digital signature / Public key certificate / Digital Signature Algorithm / SHA / Cryptography / Public-key cryptography / Key management

Microsoft PowerPoint - APTFF_KTNET_2011_Jay Kim.ppt [호환 모드]

Add to Reading List

Source URL: unnext.unescap.org

Language: English
554X.509 / RSA / Public key certificate / Padding / Digital signature / Cryptographic hash function / Arjen Lenstra / PKCS / Collision attack / Cryptography / Public-key cryptography / MD5

Colliding X.509 Certificates version 1.0, 1st March 2005 Arjen Lenstra1,2 , Xiaoyun Wang3 , and Benne de Weger2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-01 09:05:12
555IP / Undeniable signature / ElGamal signature scheme / Rabin signature algorithm / Cryptography / Public-key cryptography / Digital signature

A Secure Modified ID-based Undeniable Signature Scheme Sherman S.M. Chow ∗ Lucas C.K. Hui S.M. Yiu Department of Computer Science University of Hong Kong

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-02-10 16:32:44
556Hashing / Error detection and correction / Digital signature / Hash tree / SHA-2 / SHA-1 / RSA / Hash function / Merkle signature scheme / Cryptography / Cryptographic hash functions / Public-key cryptography

One-Time Signatures Revisited: Have They Become Practical? Dalit Naor∗ Amir Shenhav† Avishai Wool‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-02 02:25:54
557Procedural programming languages / Subroutines / Type signature / Type theory / Time signature / Digital signature / Signature / Heuristic / Matching / Cryptography / Software engineering / Computing

“More fun with Graphs” Halvar Flake – Blackhat Federal 2003 Outline for the talk Structural Function Signatures • Motivation

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
558Law / Legal documents / Biometrics / Signature / Writing / Digital signature / Act / Cryptography / Civil law / Notary

Print Form Attachment K NORTH CAROLINA DEPARTMENT OF AGRICULTURE AND CONSUMER SERVICES 2011 Speciality Crop Block Grant Program

Add to Reading List

Source URL: ncagr.gov

Language: English - Date: 2011-11-10 14:10:24
559ID-based encryption / RSA / Optimal asymmetric encryption padding / ElGamal encryption / Paillier cryptosystem / Homomorphic encryption / Block cipher modes of operation / Ciphertext indistinguishability / Digital signature / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem

Noname manuscript No. (will be inserted by the editor) Charm: A Framework for Rapidly Prototyping Cryptosystems Joseph A. Akinyele · Christina Garman · Ian Miers · Matthew W. Pagano · Michael Rushanan · Matthew Gree

Add to Reading List

Source URL: hms.isi.jhu.edu

Language: English - Date: 2013-01-28 17:13:20
560Advantage / Digital signature / Security parameter / Cryptographic primitive / RSA / Side channel attack / Cipher / Cryptographic protocol / Encryption / Cryptography / Public-key cryptography / Ciphertext indistinguishability

How to Keep a Secret: Leakage Deterring Public-key Cryptography? Aggelos Kiayias and Qiang Tang National and Kapodistrian University of Athens and University of Connecticut ,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-17 11:16:56
UPDATE