Key signature

Results: 1754



#Item
141Cryptographic protocols / Public-key cryptography / Notary / Online chat / Internet protocols / Deniable authentication / XMPP / Off-the-Record Messaging / Authentication / Digital signature / Key exchange / Transport Layer Security

Improved Group Off-the-Record Messaging Hong Liu Eugene Y. Vasserman Nicholas Hopper

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-09-04 15:59:08
142Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / XTR / Digital signature / Subtyping / Security protocol notation

Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Cambridge, UK Alan Jeffrey

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:36:15
143Cryptography / Public-key cryptography / Ciphertext indistinguishability / DolevYao model / Cryptographic protocol / Digital signature / Protocol composition logic / Cryptographic primitive / XTR / Commitment scheme / Index of cryptography articles

PDF Document

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:13
144Cryptography / Public-key cryptography / Notary / E-commerce / XTR / RSA / Digital signature / Zero-knowledge proof / Blacklist / Proof of knowledge / DiffieHellman key exchange / Internet Relay Chat

PDF Document

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2010-08-16 11:41:06
145Cryptography / Signature / Cryptography standards / Computer law / Public-key cryptography / Key management / EIDAS / Digital signature / Electronic signature / Qualified electronic signature / Advanced electronic signature / Electronic authentication

PDF Document

Add to Reading List

Source URL: opensignature.org

Language: English - Date: 2013-09-02 12:52:30
146Cryptography / Public-key cryptography / Protocol composition logic / Automated theorem proving / Cryptographic protocols / Substitution / Digital signature / Communications protocol / Transport Layer Security

PDF Document

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:12
147Key management / Electronic documents / Notary public / Electronic signature / Digital signature / Electronic commerce / Public key certificate / Identity document / Certificate authority / Cryptography / Notary / Public-key cryptography

XXIV International Congress of the International Union of Latin Notaries Mexico CityTopic II:

Add to Reading List

Source URL: www.bnotk.de

Language: English - Date: 2010-04-06 03:44:43
148Public-key cryptography / Electronic commerce / Notary / Electronic signature / Public key certificate / Information security / Digital signature / Authentication / Electronic business / Cryptography / Security / Key management

DOC Document

Add to Reading List

Source URL: www.mg.gov.pl

Language: English - Date: 2014-07-24 09:08:33
149Evaluation / Public-key cryptography / Electronic signature / FIPS 140-2 / Digital signature / Common Criteria / Protection Profile / Cryptography / Computer security / CEN Workshop Agreement

Microsoft Word - CWA14167-4_without_backup_CMCSO-PP_v028.doc

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2013-02-14 10:21:33
150Diffie–Hellman problem / Full Domain Hash / Rabin signature algorithm / Oracle machine / Optimal asymmetric encryption padding / Digital signature / Schnorr signature / Standard model / RSA / Cryptography / Public-key cryptography / Random oracle

THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2015-05-02 08:19:13
UPDATE