Key signature

Results: 1754



#Item
331Homomorphic encryption / ElGamal encryption / Probabilistic encryption / Blind signature / Encryption / Ciphertext / Goldwasser–Micali cryptosystem / Cipher / Zero-knowledge proof / Cryptography / Public-key cryptography / Paillier cryptosystem

Privacy and Verifiability in Voting Systems: Methods, Developments and Trends Hugo Jonkera,∗ , Sjouke Mauwa,b , Jun Panga a University of Luxembourg, Faculty of Sciences, Technology and Communication

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-25 07:33:00
332Information / Man-in-the-middle attack / Alice and Bob / Wide Mouth Frog protocol / Replay attack / Blind signature / Burrows–Abadi–Needham logic / Public-key cryptography / Communications protocol / Cryptography / Cryptographic protocols / Data

Protocol Interactions and the Chosen Protocol Attack John Kelsey Bruce Schneier Counterpane Systems 101 E. Minnehaha Parkway

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
333Key management / Finite fields / ID-based encryption / Group signature / XTR / RSA / Digital signature / Public key certificate / Cryptography / Public-key cryptography / Electronic commerce

An Improved ID-based Authenticated Group Key Agreement Schemes

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-18 02:47:20
334Cryptographic protocols / Electronic commerce / Error detection and correction / Public key certificate / X.509 / Root certificate / Transport Layer Security / Hash tree / Digital signature / Cryptography / Public-key cryptography / Key management

Internet Engineering Task Force (IETF) Request for Comments: 6962 Category: Experimental ISSN: B. Laurie

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2013-06-06 16:56:32
335Digital signature / RSA / Schnorr signature / Electronic signature / Proxy re-encryption / Ring signature / Cryptography / Public-key cryptography / Group signature

Proxy Re-Signatures: New Definitions, Algorithms, and Applications∗ Giuseppe Ateniese† Susan Hohenberger‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-28 13:13:41
336Advantage / Random oracle / RSA / Parity of a permutation / ElGamal signature scheme / Cryptography / Public-key cryptography / Digital signature

Verifiably Committed Signatures Provably Secure in The Standard Complexity Model Huafei Zhu Department of Information Science and Electronics Engineering, ZheJiang University, YuQuan Campus, HangZhou, 310027, PR. China E

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-01 04:50:33
337Public-key cryptography / Encryption / Digital signature / One-time pad / Key / Probabilistic encryption / Semantic security / Cryptography / Cipher / Signcryption

Public-Key Encryption with Lazy Parties∗ Kenji Yasunaga† April 28, 2015 Abstract In a public-key encryption scheme, if a sender is not concerned about the security of a message

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-28 01:59:26
338Notary / Cryptography / Digital signature / Public key certificate / First aid / Electronic submission / Cyberwarfare / Security / Key management / Public-key cryptography / Civil law

APPLICATION TO REGISTER FIRST AID TRAINER/EXAMINER

Add to Reading List

Source URL: www.hseni.gov.uk

Language: English - Date: 2011-11-10 10:58:04
339Key management / Deniable authentication / Ring signature / Digital signature / Authenticated encryption / Zero-knowledge proof / Proof of knowledge / Cryptography / Cryptographic protocols / Public-key cryptography

Microsoft Word - DA standarden.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-20 21:30:21
340Electronic commerce / Cyberwarfare / Mathematics / Applied mathematics / Implicit certificate / Finite fields / Elliptic Curve DSA / Elliptic curve cryptography / Digital signature / Public-key cryptography / Cryptography / Key management

Security of ECQV-Certified ECDSA Against Passive Adversaries

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-03-09 14:11:31
UPDATE