Digital signature

Results: 2653



#Item
891Legalization / Notary public / Birth certificate / Affidavit / Consul / Kathmandu / Digital signature / Death certificate / Thai marriage / Civil law / Notary / Law

Kathmandu, October[removed]Information Leaflet on Legalization andAttestation of documents, signatures and copies The German Embassy in Kathmandu would like to bring to your attention that the requirements for the legaliza

Add to Reading List

Source URL: www.kathmandu.diplo.de

Language: English - Date: 2013-12-11 04:28:55
892PGP / Cryptographic software / GNU Privacy Guard / Web of trust / Crypt / Digital signature / Public key fingerprint / Key / ElGamal encryption / Cryptography / Public-key cryptography / Key management

The GNU Privacy Handbook The GNU Privacy Handbook Copyright © 1999 by The Free Software Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation Li

Add to Reading List

Source URL: gnupg.org

Language: English - Date: 2000-08-08 10:33:16
893Deniable encryption / Deniable authentication / ID-based encryption / Digital signature / Commitment scheme / Zero-knowledge proof / RSA / Integrated Encryption Scheme / Index of cryptography articles / Cryptography / Public-key cryptography / Cryptographic protocols

Deniable Ring Authentication∗ Moni Naor Weizmann Institute of Science Rehovot 76100, Israel [removed]

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2002-06-03 03:07:12
894Cryptographic protocols / Internet protocols / Internet standards / Online Certificate Status Protocol / Revocation list / Public key certificate / Certificate authority / Public key infrastructure / Digital signature / Cryptography / Public-key cryptography / Key management

A Distributed Online Certificate Status Protocol with a Single Public Key Satoshi Koga1 and Kouichi Sakurai2 1 Graduate School of Information Science and Electrical Engineering,

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:55
895Computer law / Constitutional amendment / Directive / Digital signature / European Union / Digital signatures and law / Directive on services in the internal market / Cryptography / Law / Electronic signature

COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, [removed]COM[removed]fmal[removed]COD)

Add to Reading List

Source URL: aei.pitt.edu

Language: English - Date: 2012-08-29 13:25:12
896RSA / Threshold cryptosystem / Electronic voting / Digital signature / Blind signature / Damgård–Jurik cryptosystem / Cryptography / Public-key cryptography / Paillier cryptosystem

Proceedings of the 20th ACM Symposium on Principles of Distributed Computing (PODC ’[removed] – 29 august 2001, Newport, Rhode Island, USA) N. Shavit Ed. ACM Press, New York, pages 274–283. Practical Multi-Candidate

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2004-05-13 14:36:02
897IP / Message authentication code / NP / Cryptography / Public-key cryptography / Digital signature

J. Cryptol[removed]: 310–348 DOI: [removed]s00145[removed]Multi-Verifier Signatures∗ Tom Roeder† Microsoft Research, Redmond, USA

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-03-16 18:26:36
898Field theory / Finite fields / Public-key cryptography / Group theory / Elliptic Curve DSA / Elliptic curve cryptography / Elliptic curve / ElGamal signature scheme / Discrete logarithm / Abstract algebra / Cryptography / Algebra

The Elliptic Curve Digital Signature Algorithm (ECDSA)    

Add to Reading List

Source URL: cs.ucsb.edu

Language: English - Date: 2009-10-15 20:03:40
899Civil law / Signature / Digital signature / Cyberwarfare / Cryptography / Fraternities and sororities in North America / Transcript

Office of Greek Life and Student Organizations Grade Release Form I authorize the Director of Student Life at Murray State University, by my signature and provision of my M number, to release a portion of my educational

Add to Reading List

Source URL: murraystate.edu

Language: English - Date: 2010-03-05 16:38:51
900ID-based encryption / ID-based cryptography / Key distribution / Public key infrastructure / Digital signature / Man-in-the-middle attack / Key / Cryptography / Key management / Public-key cryptography

An Identity-Based Key Infrastructure Suitable for Messaging and Its Application to E-mail ∗ Ay¸se Gül Karatop

Add to Reading List

Source URL: research.sabanciuniv.edu

Language: English - Date: 2008-11-07 06:20:13
UPDATE