Key signature

Results: 1754



#Item
291Message authentication codes / Digital signature / Cryptographic hash function / Cryptographic primitive / RSA / Key / Probabilistic encryption / Block cipher / Galois/Counter Mode / Cryptography / Public-key cryptography / Key management

Abstract appearing in Proceedings of the 27th ACM Symposium on the Theory of Computing, MayIncremental Cryptography and Application to Virus Protection Mihir Bellare∗

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2004-08-02 17:51:17
292Key management / Internet protocols / Public-key cryptography / Internet standards / Domain Name System Security Extensions / Digital signature / Zone file / Keysigning / DNS zone / Cryptography / Domain name system / Internet

.ca Signing Metrics R. Gieben∗ NLnet Labs May 2, 2006 NLnet Labs document

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10
293Public-key cryptography / Computer law / Electronic signature / Email / Digital signature / Public key certificate / Telecommunications data retention / EGovernment in Europe / Cryptography / Electronic documents / Key management

Electronic Communications Transactions Act No.25 of12:02 PM Act No. 25, 2002 ELECTRONIC COMMUNICATIONS AND TRANSACTIONS ACT. 2002

Add to Reading List

Source URL: www.honda.co.za

Language: English - Date: 2012-01-17 06:26:34
294X.509 / Public key infrastructure / PKCS / Credential / Cryptographic nonce / Cryptography / Public-key cryptography / Digital signature

Alpaca: Extensible Authorization for Distributed Services Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, Robert Morris, and M. Frans Kaashoek MIT CSAIL Cambridge, MA, USA {ctl,

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2009-11-10 14:15:06
295Finite fields / Computational hardness assumptions / Diffie–Hellman key exchange / Key-agreement protocol / Diffie–Hellman problem / ID-based encryption / XTR / Key exchange / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

ID-based Authenticated Two Round Multi-Party Key Agreement

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-20 20:23:11
296Public-key cryptography / BlackBerry / Java platform / Key management / Code signing / Application programming interface / Java Servlet / Digital signature / Java / Cryptography / Computing / Software

BlackBerry Signing Authority Tool VersionPassword Based Administrator Guide BlackBerry Signing Authority Tool VersionPassword Based Administrator Guide

Add to Reading List

Source URL: docs.blackberry.com

Language: English - Date: 2014-05-09 21:57:35
297Certificate policy / Public key certificate / Revocation list / Online Certificate Status Protocol / Certificate authority / Public key infrastructure / Digital signature / X.509 / Data Validation and Certification Server / Cryptography / Public-key cryptography / Key management

Signature RTD Certificate Policy Policy Document VersionSIGNATURE_CP] NFC ForumTM

Add to Reading List

Source URL: members.nfc-forum.org

Language: English
298Digital signature / RSA / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / ID-based encryption

Key Replacement Attack on a Certificateless Signature Scheme Zhenfeng Zhang, Dengguo Feng, State Key Laboratory of Information Security Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhan

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-30 05:02:16
299Cryptographic protocols / Notary / Digital signature / Public key certificate / Key / Authentication / Man-in-the-middle attack / MIKEY / Cryptography / Public-key cryptography / Key management

PROTOCOLS FOR PUBUC KEY CRYPTOSYSTEMS Ralph C. Merkle ELXSi International ......

Add to Reading List

Source URL: www.merkle.com

Language: English - Date: 2010-07-19 01:52:15
300Mathematics / Error detection and correction / Finite fields / Applied mathematics / Computing / McEliece cryptosystem / Forward error correction / RSA / Low-density parity-check code / Public-key cryptography / Coding theory / Electronic commerce

Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature Kazukuni Kobara Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), 10F 1003, Aki

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-20 21:26:35
UPDATE