Key signature

Results: 1754



#Item
661Crime prevention / National security / Ueli Maurer / Outline of cryptography / Information security / Key-agreement protocol / Elliptic curve cryptography / ETH Zurich / Digital signature / Cryptography / Cryptographic protocols / Computer security

Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland

Add to Reading List

Source URL: www.infsec.ch

Language: English - Date: 2014-11-20 07:42:12
662ISO standards / Electronic documents / Key management / Portable Document Format / Cryptographic Message Syntax / PDF/A / PKCS / X.509 / Digital signature / Cryptography / Public-key cryptography / Cryptographic protocols

TechNote 0006: Digital Signatures in PDF/A-1

Add to Reading List

Source URL: www.pdfa.org

Language: English - Date: 2012-09-06 08:52:58
663Business / Private law / Association of American Universities / Lease / Fee / Law / New York University / Middle States Association of Colleges and Schools

[removed]NEW YORK UNIVERSITY STUDENT HOUSING LICENSE Your signature on the[removed]Student Housing Application, completion of the electronic application, or your acceptance of an assigned space or a room key, signifie

Add to Reading List

Source URL: www.nyu.edu

Language: English - Date: 2015-04-05 22:20:12
664Civil law / Digital signature / RSA / Security / Group signature / Cryptography / Public-key cryptography / Cyberwarfare

Microsoft Word[removed]Cryptanalysis of a threshold proxy signature with known signers.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-11-17 01:16:10
665Public-key cryptography / International trade / Electronic signature / Digital signature / Authentication / UN/CEFACT / Cryptography / Notary / Key management

UN/CEFACT Project Proposal Revision of Recommendation 14, Authentication of Trade Documents by Means other than Signature. Submitted Date: [removed]Last Update Date: [removed]Version: 1.0

Add to Reading List

Source URL: www1.unece.org

Language: English - Date: 2012-07-04 08:51:58
666Payment systems / Financial services / Merchant services / Electronic commerce / HSBC / Chip and PIN / MasterCard / Card security code / Visa Inc. / Credit cards / Business / Financial economics

Signature Credit Card from HSBC and MakeMyTrip For details on Banking Codes and Standards Board of India (BCSBI), please refer to page no. 69 of this book. Key Things You Should Know 1. Signature Credit Cards from HSB

Add to Reading List

Source URL: www.hsbc.co.in

Language: English - Date: 2015-01-28 00:21:11
667Digital signature / Diffie–Hellman problem / Signcryption / Group signature / Blind signature / ID-based encryption / RSA / Pairing / Diffie–Hellman key exchange / Cryptography / BLS / Decisional Diffie–Hellman assumption

Pairing-Based Cryptographic Protocols : A Survey Ratna Dutta, Rana Barua and Palash Sarkar Cryptology Research Group Stat-Math and Applied Statistics Unit 203, B. T. Road, Kolkata India[removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-06-24 08:19:14
668Blind signature / Proxy re-encryption / Deniable encryption / Cryptography / Public-key cryptography / Key

The Ephemerizer: Making Data Disappear

Add to Reading List

Source URL: www.filibeto.org

Language: English - Date: 2007-02-09 08:43:57
669Applied mathematics / RSA / Security / Digital signature / Rabin signature algorithm / ElGamal signature scheme / Public-key cryptography / Cryptography / Cyberwarfare

PSS is Secure against Random Fault Attacks Jean-S´ebastien Coron and Avradip Mandal University of Luxembourg Abstract. A fault attack consists in inducing hardware malfunctions in order to recover secrets from electroni

Add to Reading List

Source URL: www.jscoron.fr

Language: English - Date: 2014-12-02 03:11:30
670ID-based encryption / Semantic security / Chosen-plaintext attack / RSA / Advantage / Boneh/Franklin scheme / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / GMR / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions∗ Yang Cui1 , Eiichiro Fujisaki2 , Goichiro Hanaoka1 , Hideki Imai1,3 and Rui Zhang1 1 National Institute of Advanced Ind

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-10 22:37:01
UPDATE