<--- Back to Details
First PageDocument Content
Cryptographic protocols / Electronic commerce / X.509 / NSA Suite B Cryptography / Elliptic curve cryptography / Elliptic Curve DSA / Revocation list / Public key certificate / Elliptic curve Diffie–Hellman / Cryptography / Public-key cryptography / Key management
Date: 2014-06-30 09:00:10
Cryptographic protocols
Electronic commerce
X.509
NSA Suite B Cryptography
Elliptic curve cryptography
Elliptic Curve DSA
Revocation list
Public key certificate
Elliptic curve Diffie–Hellman
Cryptography
Public-key cryptography
Key management

Add to Reading List

Source URL: tools.ietf.org

Download Document from Source Website

File Size: 41,90 KB

Share Document on Facebook

Similar Documents

Public-key cryptography / Elliptic Curve DSA / Hash function / Key / Wallet / Cryptographic nonce / SHA-2 / Cryptography / Bitcoin / Peer-to-peer computing

Deterministic wallets End Deterministic wallets Gregory Maxwell et. al.

DocID: 1gGjd - View Document

Information / NSA Suite B Cryptography / Internet Key Exchange / IPsec / Elliptic curve cryptography / Elliptic curve Diffie–Hellman / Elliptic Curve DSA / Key-agreement protocol / Diffie–Hellman key exchange / Cryptographic protocols / Cryptography / Data

Internet Engineering Task Force (IETF) Request for Comments: 6380 Category: Informational ISSN: K. Burgin

DocID: 1avEc - View Document

Forking lemma / Random oracle / Preimage attack / Digital signature / Collision resistance / Elliptic Curve DSA / Standard model / MD5 / Birthday attack / Cryptography / Cryptographic hash functions / Schnorr signature

Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, Switzerland

DocID: 19LBC - View Document

Ubiquitous computing / Smart cards / Contactless smart card / RSA / Digital signature / Java Card / Elliptic Curve DSA / Magnetic stripe card / Power analysis / Cryptography / Public-key cryptography / ISO standards

May 20, 2011 Smart card implementation of a digital signature scheme for Twisted Edwards curves Author: Niels Duif∗

DocID: 19d9u - View Document

Cryptographic protocols / Elliptic curve Diffie–Hellman / Diffie–Hellman key exchange / SHA-1 / SHA-2 / Elliptic Curve DSA / Key derivation function / Key / CRYPTREC / Cryptography / Cryptographic hash functions / Key management

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Key Establishment Schemes —

DocID: 18KxF - View Document