Digital signature

Results: 2653



#Item
41Cryptography / Public-key cryptography / Secret sharing / Key management / Digital signature / Signature / Digital Signature Algorithm / Commitment scheme / Threshold cryptosystem / Semantic security / RSA / Bitcoin

Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1 City College, City University of New York

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-01-26 19:57:17
42Cryptography / Public-key cryptography / Undeniable signature / Digital signature / RSA / David Chaum / Group signature / Ring signature / Index of cryptography articles

Group Signatures David C h a m Eugtne van Heyst CWi Came for Mathematics and Computer Science, Kruislaan 413, 1098 SJ Amsterdam, The Netherlands.

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:05:04
43Cryptography / Internet / Computing / Internet protocols / Internet Standards / Domain name system / Key management / Public-key cryptography / Domain Name System Security Extensions / Digital signature / Zone file

.ca Signing Metrics R. Gieben∗ NLnet Labs May 2, 2006 NLnet Labs document

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10
44Cryptography / Signature / Computer law / Cryptography standards / Records management technology / Public-key cryptography / Cryptomathic / EIDAS / Digital signature / Qualified electronic signature / Electronic signature / Key management

www.t hales-esecurity.com SECURE YOUR CUSTOMERS’ ONLINE JOURNEY WITH A CENTRALIZED SOLUTION FOR QUALIFIED ELECTRONIC SIGNATURE Solution Benefits • Give your customers freedom to sign transactions and

Add to Reading List

Source URL: www.kyos.ch

Language: English - Date: 2016-07-26 10:21:56
45Cryptography / Message authentication codes / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Digital Signature Algorithm / FIPS 140-2 / Dual EC DRBG / OpenSSL / SHA-2 / Hash-based message authentication code

FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-05-26 13:27:36
46Cryptography / Radio-frequency identification / Data Encryption Standard / Automatic identification and data capture / Wireless / Feistel cipher / Singulation / Advanced Encryption Standard / Stream cipher / Digital signature / Digital signature transponder

Proceedings - NN - RFIDSec08

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:40:17
47Cryptography / Public-key cryptography / Communications protocol / Data transmission / Digital signature / Short Message Service / Adversary / Peer-to-peer / Secure multi-party computation

A Game-Theoretic Framework for Analyzing Trust-Inference Protocols∗ Ruggero Morselli† Jonathan Katz†

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2006-03-28 14:11:04
48Software / Application software / Adobe software / Technical communication tools / Adobe Systems / Adobe Acrobat / Portable Document Format / Adobe Acrobat version history / Adobe LiveCycle Designer

Steps for placing an Adobe Digital Signature on a MS Word Document using Adobe Acrobat Professional 10 or greater Open the MS Word file. For this 12 step process, I will be using Microsoft WordThe first step is

Add to Reading List

Source URL: armypubs.army.mil

Language: English - Date: 2014-09-16 10:31:36
49Cryptography / Public-key cryptography / Records management technology / Signature / Cryptographic hash functions / Error detection and correction / Hash function / Crypt / Electronic signature / Digital signature

eSignature at EC EEMA BE BriefingPierre A. Damas European Commission DIGIT.B.1.002

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:12
50Cryptography / Public-key cryptography / Key management / Konrad Zuse / Mechanical computers / Elliptic curve cryptography / Radio-frequency identification / Key / Z2 / Z1 / Digital signature

Proceedings - NN - A Milestone Towards RFID Products Offering Asymmetric Authentication Based on Elliptic

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:43:24
UPDATE