<--- Back to Details
First PageDocument Content
Federated identity / System software / Security / Identity provider / Public key certificate / ElGamal encryption / Public-key cryptography / Identity management / Computer security
Date: 2014-12-08 08:50:17
Federated identity
System software
Security
Identity provider
Public key certificate
ElGamal encryption
Public-key cryptography
Identity management
Computer security

Microsoft PowerPoint - IRMA eID 0.3.pptx

Add to Reading List

Source URL: www.eid-stelsel.nl

Download Document from Source Website

File Size: 3,01 MB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Commitment scheme / ElGamal encryption / DiffieHellman key exchange / Elgamal / Homomorphic encryption

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

DocID: 1rsiG - View Document

Cryptography / Public-key cryptography / Computational complexity theory / Paillier cryptosystem / Proof of knowledge / Commitment scheme / RSA / Zero-knowledge proof / Permutation / ElGamal encryption / IP

A Commitment-Consistent Proof of a Shuffle Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. We introduce a pre-computation technique that drastically

DocID: 1r7EK - View Document

Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Ciphertext / Secure multi-party computation / Cryptosystem / Data anonymization / ElGamal encryption

Efficient Anonymity-Preserving Data Collection Justin Brickell and Vitaly Shmatikov Department of Computer Sciences The University of Texas at Austin Austin, TX, USA

DocID: 1qCnF - View Document

Cryptography / Cryptographic software / OpenPGP / Side-channel attacks / E-commerce / RSA / Modular exponentiation / Chosen-ciphertext attack / ElGamal encryption / Adaptive chosen-ciphertext attack / Electromagnetic attack / Public-key cryptography

Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

DocID: 1qxjY - View Document

Cryptography / Public-key cryptography / Homeomorphisms / Homomorphic encryption / Malleability / CramerShoup cryptosystem / Semantic security / Plaintext-aware encryption / ElGamal encryption / Cryptosystem / RSA / Random oracle

Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. Consider an electronic election scheme implemented using a

DocID: 1q9YH - View Document