Key signature

Results: 1754



#Item
151Digital signature / ID-based encryption / RSA / Cryptography / Public-key cryptography / Ciphertext indistinguishability

An extended abstract of this paper is published in the proceedings of ASIACRYPTSignature Schemes Secure against Hard-to-Invert Leakage Sebastian Faust∗, Carmit Hazay†,

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-12-29 12:12:28
152Key management / PAdES / XAdES / CAdES / Digital signature / European Telecommunications Standards Institute / Electronic signature / Cryptographic hash function / Public key certificate / Cryptography / Cryptography standards / Public-key cryptography

TRV1Electronic Signatures and Infrastructures (ESI); Business guidance on cryptographic suites

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2015-05-12 09:17:43
153Computer law / Privacy law / Electronic Signatures in Global and National Commerce Act / Digital signature / Negotiable Instruments Act / Public key certificate / Electronic signature / Uniform Electronic Transactions Act / Cryptography / Key management / Public-key cryptography

MINISTRY OF LAW, JUSTICE AND COMPANY AFFAIRS (Legislative Department) New Delhi, the 9th June, 2000/Jyaistha 19, 1922 (Saka) The following Act of Parliament received the assent of the President on the 9th June, 2000, an

Add to Reading List

Source URL: www.nia.gov.in

Language: English - Date: 2013-01-08 08:43:31
154Computing / Protection Profile / Key management / Public-key cryptography / Common Criteria / Electronic signature / Evaluation Assurance Level / Public key certificate / Integrity / Computer security / Evaluation / Security

Protection profiles for secure signature creation device — Part 6: Extension for device with key import and trusted communication with signature creation application

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2014-02-14 05:40:12
155Digital signature / RSA / Random oracle / Commitment scheme / Cryptographic protocol / Model theory / XTR / Cryptography / Public-key cryptography / Blind signature

Concurrently-Secure Blind Signatures without Random Oracles or Setup Assumptions? Carmit Hazay1 , Jonathan Katz2 , Chiu-Yuen Koo2 , and Yehuda Lindell1 1 Bar-Ilan University.

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 08:30:47
156Evaluation / Public-key cryptography / FIPS 140-2 / Electronic signature / Common Criteria / Protection Profile / Digital signature / Backup / Cryptography / Computer security / CEN Workshop Agreement

Microsoft Word - CWA14167-2_with_backup_CMCSOB-PP_v028.doc

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2013-02-14 10:21:34
157Public-key cryptography / Electronic commerce / Key management / Public key certificate

SAMPLE Home Theft Protection Guarantee Customer Signature

Add to Reading List

Source URL: www.guardianprotection.com

Language: English - Date: 2014-08-27 07:57:18
158

Protection profiles for secure signature creation device — Part 3: Device with key Version 1.0.2

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2013-02-14 10:26:06
    159CEN Workshop Agreement / Electronic signature / Digital signature / Public key certificate / FIPS 140-2 / Cryptography / Key management / Public-key cryptography

    www.thales-esecurity.com Protection Profiles for Signing Devices Report on CEN Standardisation Activities on Security of Electronic Signatures

    Add to Reading List

    Source URL: www.yourcreativesolutions.nl

    Language: English - Date: 2011-09-21 17:32:04
    UPDATE