Key signature

Results: 1754



#Item
221Cryptographic protocols / Digital signature / Paperless office / Public key infrastructure / Electronic signature / X.509 / Legal instrument / Signature / Cryptography / Public-key cryptography / Key management

Brochure_VMESign_New2adjusted

Add to Reading List

Source URL: www.meganet.com

Language: English - Date: 2014-10-24 18:01:38
222Video processing / Security / Biometrics / Identification / Fingerprint / Science / Video copy detection / Cryptography / Public key fingerprint / Acoustic fingerprinting / Digital rights management / Digital video fingerprinting

Signature Certain copies make you smile. Others don’t. www.ina.fr/signature

Add to Reading List

Source URL: www.institut-national-audiovisuel.fr

Language: English - Date: 2011-06-22 04:31:42
223Public-key cryptography / Digital signature / Key management / Notary / Ciphertext indistinguishability / Computational complexity theory / Reduction / Security parameter / RSA / Cryptography / Theoretical computer science / Applied mathematics

On the Impossibility of Tight Cryptographic Reductions Christoph Bader, Tibor Jager, Yong Li, and Sven Sch¨age Horst G¨ortz Institute for IT Security, Ruhr-University Bochum, Germany {christoph.bader, tibor.jager, yong

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-27 06:52:51
224Security / Applied mathematics / Signcryption / Digital signature / Cipher / Elliptic curve cryptography / ID-based encryption / Cryptography / Public-key cryptography / Cyberwarfare

1 Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks Attila Altay Yavuz and Peng Ning

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:12
225Theoretical computer science / Quantum cryptography / Quantum computer / Post-quantum cryptography / Digital signature / Quantum algorithm / Key size / Cryptographic primitive / Elliptic curve cryptography / Cryptography / Public-key cryptography / Key management

Evaluating Post-Quantum Asymmetric Cryptographic Algorithm Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:28:55
226NTRUSign / Lattice-based cryptography / NTRU / Homomorphic encryption / Digital signature / Lattice problem / RSA / Elliptic curve cryptography / Lattice / Cryptography / Post-quantum cryptography / Public-key cryptography

Practical Lattice-based Digital Signature Schemes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:42:22
227GMR / Claw-free permutation / Digital signature / One-way function / Goldwasser–Micali cryptosystem / Silvio Micali / Quadratic residue / RSA / Binary tree / Cryptography / Public-key cryptography / Electronic commerce

Appeared in Advances in Cryptology { Crypto `86 (Proceedings), (A.M. Odlyzko ed.), Lecture Note in Computer ScienceSpringer Verlag, pages 104{110, 1987. Two Remarks Concerning the Goldwasser-Micali-Rivest Signatur

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2014-06-22 06:26:58
228Key management / Notary / Public-key cryptography / Supervisor / Cyberwarfare / Cryptography / Civil law / Digital signature

School of Mechanical Engineering HONOURS PROJECT COMPLETION FORM Successful submission of this completed form marks the end of your final year project. After the Project Exhibition please complete and return this form to

Add to Reading List

Source URL: mecheng.adelaide.edu.au

Language: English - Date: 2015-02-22 23:59:09
229Notary / Cryptography / Authorization / Digital signature / Security / Computer security / Civil law / Key management / Public-key cryptography

Clear Form Print Form UNIVERSITY OF CALIFORNIA INSTRUCTIONS: A signature authorization is a delegation of authority and remains in

Add to Reading List

Source URL: controller.ucsf.edu

Language: English - Date: 2014-03-13 17:10:10
230PGP / Cryptographic software / GNU Privacy Guard / Web of trust / Crypt / Digital signature / Public key fingerprint / Key / ElGamal encryption / Cryptography / Public-key cryptography / Key management

The GNU Privacy Handbook The GNU Privacy Handbook Copyright © 1999 by The Free Software Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation Li

Add to Reading List

Source URL: www.gnupg.org

Language: English - Date: 2000-08-08 10:33:16
UPDATE