Key signature

Results: 1754



#Item
371Cryptographic hash functions / Electronic commerce / Certificate policy / SHA-1 / SHA-2 / Digital signature / Public key certificate / Digital Signature Algorithm / SHA / Cryptography / Public-key cryptography / Key management

Microsoft PowerPoint - APTFF_KTNET_2011_Jay Kim.ppt [호환 모드]

Add to Reading List

Source URL: unnext.unescap.org

Language: English
372X.509 / RSA / Public key certificate / Padding / Digital signature / Cryptographic hash function / Arjen Lenstra / PKCS / Collision attack / Cryptography / Public-key cryptography / MD5

Colliding X.509 Certificates version 1.0, 1st March 2005 Arjen Lenstra1,2 , Xiaoyun Wang3 , and Benne de Weger2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-01 09:05:12
373IP / Undeniable signature / ElGamal signature scheme / Rabin signature algorithm / Cryptography / Public-key cryptography / Digital signature

A Secure Modified ID-based Undeniable Signature Scheme Sherman S.M. Chow ∗ Lucas C.K. Hui S.M. Yiu Department of Computer Science University of Hong Kong

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-02-10 16:32:44
374Hashing / Error detection and correction / Digital signature / Hash tree / SHA-2 / SHA-1 / RSA / Hash function / Merkle signature scheme / Cryptography / Cryptographic hash functions / Public-key cryptography

One-Time Signatures Revisited: Have They Become Practical? Dalit Naor∗ Amir Shenhav† Avishai Wool‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-02 02:25:54
375ID-based encryption / RSA / Optimal asymmetric encryption padding / ElGamal encryption / Paillier cryptosystem / Homomorphic encryption / Block cipher modes of operation / Ciphertext indistinguishability / Digital signature / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem

Noname manuscript No. (will be inserted by the editor) Charm: A Framework for Rapidly Prototyping Cryptosystems Joseph A. Akinyele · Christina Garman · Ian Miers · Matthew W. Pagano · Michael Rushanan · Matthew Gree

Add to Reading List

Source URL: hms.isi.jhu.edu

Language: English - Date: 2013-01-28 17:13:20
376Advantage / Digital signature / Security parameter / Cryptographic primitive / RSA / Side channel attack / Cipher / Cryptographic protocol / Encryption / Cryptography / Public-key cryptography / Ciphertext indistinguishability

How to Keep a Secret: Leakage Deterring Public-key Cryptography? Aggelos Kiayias and Qiang Tang National and Kapodistrian University of Athens and University of Connecticut ,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-17 11:16:56
377Science / Pharmaceutical industry / Key management / Public-key cryptography / Digital signature / Electronic signature / Clinical trial / Inform / Case report form / Cryptography / Research / Clinical research

Microsoft PowerPoint - InForm4.6 Module S Signatures in InForm V1.0 27Feb2013.ppt [Compatibility Mode]

Add to Reading List

Source URL: ctc.usyd.edu.au

Language: English - Date: 2013-04-29 22:48:04
378Key signature / Staff / Note / Musical keyboard / Accidental / Sharp / Ledger line / Musical notation / Music / Clef

  1   CAG  Meeting  Minutes    

Add to Reading List

Source URL: www.i10corridorproject.org

Language: English - Date: 2015-04-09 13:48:30
379Key signature / Staff / Note / Musical keyboard / Accidental / Sharp / Ledger line / Musical notation / Music / Clef

  Teacher’s  Manual   www.teoria.com
  

Add to Reading List

Source URL: www.teoria.com

Language: English - Date: 2014-12-19 12:27:46
380Public-key cryptography / Key management / Key / Identity document / Digital signature / Cryptography / Security / Locksmithing

UNIVERSITY OF CALIFORNIA BERKELEY - VLSB

Add to Reading List

Source URL: mvz.berkeley.edu

Language: English - Date: 2014-09-07 04:08:33
UPDATE