Key signature

Results: 1754



#Item
341Hashing / Cryptographic hash functions / Trusted third party / Hash list / Hash function / Digital signature / RSA / Cryptography / Public-key cryptography / Error detection and correction

Microsoft PowerPoint - 05-Contract-Signing Protocols.ppt

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2005-01-05 04:11:06
342Public key certificate / Identity document / Digital signature / Electronic identity card / Cryptography / Key management / Public-key cryptography

NB: This is an unofficial translation! Act on Electronic Service in the AdministrationChapter 1 General provisions

Add to Reading List

Source URL: www.finlex.fi

Language: English
343Group signature / Accumulator / Proof of knowledge / Diffie–Hellman problem / XTR / Diffie–Hellman key exchange / Zero-knowledge proof / Direct Anonymous Attestation / Cryptography / Cryptographic protocols / Finite fields

An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials Jan Camenisch1 , Markulf Kohlweiss2 , and Claudio Soriente3 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-22 05:56:52
344RSA / Digital signature / Pavilion / Cryptography / Public-key cryptography / EMC Corporation

Microsoft Word - Partner Pavilion Rules and Regs 2015.doc

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2014-08-13 15:41:40
345Civil law / Digital signature / Key management / Notary / RSA / Model theory / Structure / Permutation / Mathematics / Public-key cryptography / Cryptography

An extended abstract of this work appeared in the proceedings of PKCThis is the full version. Tightly-Secure Signatures from Chameleon Hash Functions Olivier Blazy1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-22 09:39:13
346Key management / Notary / Public-key cryptography / Cyberwarfare / Security / Cryptography / Civil law / Digital signature

A Key Substitution Attack on SFLASHv3 Willi Geiselmann and Rainer Steinwandt IAKS, Arbeitsgruppe Systemsicherheit, Prof. Dr. Th. Beth Fakult¨ at f¨ ur Informatik, Universit¨at Karlsruhe,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-26 09:47:08
347Cryptographic protocols / Public-key cryptography / Proof of knowledge / Zero-knowledge proof / Digital signature / Parity of a permutation / PP / NP / XTR / Cryptography / Theoretical computer science / Applied mathematics

Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs Chunming Tang1,∗ Dingyi Pei1,2 Zhuojun Liu3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-29 06:02:29
348Ciphertext indistinguishability / Public-key cryptography / Encryption / VMAC / Digital signature / Deterministic encryption / Advantage / Cipher / Galois/Counter Mode / Cryptography / Authenticated encryption / Message authentication code

Chapter 7 Message Authentication In most people’s minds, privacy is the goal most strongly associated to cryptography. But message authentication is arguably even more important. Indeed you may or may not care if some

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:25:35
349Digital signature / Notary / Alice and Bob / Cryptography / Public-key cryptography / Key management

DIGITAL SIGNATURES 1/1 Signing by hand

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2011-11-15 20:06:48
350Lattice / Digital signature / Cryptography / Public-key cryptography / Elliptic Curve DSA

Proceedings of PKC ’05 (January 23–26, 2005, Les Diablerets, Switzerland) S. Vaudenay (Ed.), vol. ???? of Lecture Notes in Computer Science, pages ??–?? c IACR (http://www.iacr.org) and Springer-Verlag (http://www

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-11-19 06:18:26
UPDATE