ID-based cryptography

Results: 183



#Item
41Quantum key distribution / Id Quantique / Key distribution / Advanced Encryption Standard / Wireless security / Secure Communication based on Quantum Cryptography / Cryptography / Quantum cryptography / Quantum information science

USER CASE REDEFINING SECURITY QKD as a Service Colt & IDQ provide Managed Quantum Cryptography Service for high-security network encryption in Switzerland

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:12
42Digital signature / RSA / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / ID-based encryption

Key Replacement Attack on a Certificateless Signature Scheme Zhenfeng Zhang, Dengguo Feng, State Key Laboratory of Information Security Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhan

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-30 05:02:16
43Designated verifier signature / Random oracle / RSA / Group signature / BLS / Cryptography / Public-key cryptography / Digital signature

An Efficient ID- based Directed Signature Scheme from Bilinear Pairings 1 B. Umaprasada Rao,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-07 01:34:37
44Public-key cryptography / Key / Symmetric-key algorithm / Proxy re-encryption / ID-based encryption / Cryptography / Key management / Cipher

DATA CENTER Encryption Solution Design and Deployment Considerations This Encryption Solution Design and Deployment Considerations reference guide is designed to help customers and partners

Add to Reading List

Source URL: www.brocade.com

Language: English - Date: 2014-10-16 13:08:00
45Email / Internet / Public-key cryptography / Electronic documents / S/MIME / Email client / ID-based encryption / Cryptography / Computing / Email authentication

User-Level_S:MIME Encryption

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2011-05-24 15:35:31
46Computing / Computer-mediated communication / Internet privacy / Milter / Sendmail / S/MIME / Encryption / ID-based encryption / Internet messaging platform / Cryptography / Email / Email authentication

Data Sheet SeNDMAIL ENCRYPTION Policy-Based Encryption with Voltage IBE OVERVIEW

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2007-09-14 14:24:07
47Computing / Computer-mediated communication / Internet privacy / Milter / Sendmail / S/MIME / Encryption / ID-based encryption / Internet messaging platform / Cryptography / Email / Email authentication

Data Sheet SeNDMAIL ENCRYPTION Policy-Based Encryption with Voltage IBE OVERVIEW

Add to Reading List

Source URL: sendmail.com

Language: English - Date: 2007-09-14 14:24:07
48Email / Internet / Public-key cryptography / Electronic documents / S/MIME / Email client / ID-based encryption / Cryptography / Computing / Email authentication

User-Level_S:MIME Encryption

Add to Reading List

Source URL: sendmail.com

Language: English - Date: 2011-05-24 15:35:31
49Oblivious transfer / ID-based encryption / Universal composability / Communications protocol / Cryptographic protocols / Data / Information

Cryptography for Secure and Private Databases: Enabling Practical Data Access without Compromising Privacy by Matthew Daniel Green

Add to Reading List

Source URL: spar.isi.jhu.edu

Language: English - Date: 2010-02-27 17:25:11
50Espionage / Security / Cipher / RSA / ID-based encryption / Chosen-ciphertext attack / Chosen-plaintext attack / Cramer–Shoup cryptosystem / ElGamal encryption / Public-key cryptography / Cryptography / Cyberwarfare

Ciphertext-Policy Attribute-Based Encryption

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:48
UPDATE