Key signature

Results: 1754



#Item
731Public key certificate / Electronic signature / Privacy of telecommunications / Cryptography / Security / Identity document

NB: Unofficial translation; legally binding texts are those in Finnish and Swedish Act on Strong Electronic Identification and Electronic Signatures[removed])

Add to Reading List

Source URL: www.finlex.fi

Language: English
732Public key certificate / PKCS / Radio button / Universal Serial Bus / Computer security / Security / Cyberwarfare / Public-key cryptography / Security token / Button

Process flow for Registering Digital Signature Certificate To attest and forward claims online, the employers are required to register Digital Signature Certificate (DSC) with EPFO. Digital Signature Certificate of class

Add to Reading List

Source URL: epfindia.gov.in

Language: English - Date: 2013-07-29 08:04:12
733PKCS / Abstract Syntax Notation One / Octet / Padding / RSA / Cryptographic hash function / Ip / Basic Encoding Rules / Cryptography / Cryptography standards / Public-key cryptography

Intel Security: Advanced Threat Research BERserk Vulnerability Part 1: RSA signature forgery attack due to incorrect parsing of ASN.1 encoded DigestInfo in PKCS#1 v1.5 September 29, 2014

Add to Reading List

Source URL: www.intelsecurity.com

Language: English - Date: 2014-09-30 12:40:24
734Cyberwarfare / Applied mathematics / Finite fields / Homomorphic encryption / RSA / XTR / Learning with errors / Digital signature / Group signature / Cryptography / Public-key cryptography / Mathematics

Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based San Ling, Khoa Nguyen, Huaxiong Wang Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-09 09:24:22
735Civil law / Notary / Legal documents / Cryptography / Digital signature / Public key certificate / Contract / Europass / Cyberwarfare / Key management / Public-key cryptography / Law

RTF Document

Add to Reading List

Source URL: fra.europa.eu

Language: English - Date: 2014-08-26 09:08:47
736Electronic documents / Digital signature / Key management / Public-key cryptography / Inkjet printer / Charter School / Media technology / Technology / Cryptography / Civil law / Notary

[removed]Agreement Renewal for Charter Schools Helpful Hints to complete the three-part renewal process Thank you in advance for your understanding of the delay in finalizing the[removed]Annual School Nutrition Progra

Add to Reading List

Source URL: childnutrition.ncpublicschools.gov

Language: English - Date: 2014-07-17 14:24:58
737Cryptographic protocols / Internet protocols / Internet standards / Public key certificate / Certificate policy / Online Certificate Status Protocol / HTTP Secure / Digital signature / X.509 / Cryptography / Public-key cryptography / Key management

IGC BASIC SOFTWARE UNAFFILIATED CERTIFICATE SUBSCRIBER AGREEMENT This IGC Basic Software Unaffiliated Certificate Subscriber Agreement (this “Agreement”) is made by and between IdenTrust (defined below) and You (defi

Add to Reading List

Source URL: secure.identrust.com

Language: English - Date: 2014-06-26 18:27:22
738Cryptographic protocols / Internet protocols / Internet standards / Public key certificate / Certificate policy / Online Certificate Status Protocol / HTTP Secure / Digital signature / Revocation list / Cryptography / Public-key cryptography / Key management

IGC MEDIUM SOFTWARE CERTIFICATE SUBSCRIBER AGREEMENT This IGC Medium Software Certificate Subscriber Agreement (this “Agreement”) is made by and among IdenTrust (defined below) on the one hand, and You (defined below

Add to Reading List

Source URL: secure.identrust.com

Language: English - Date: 2014-06-26 18:27:22
739Public-key cryptography / Key management / Cryptographic protocols / Payment systems / Cryptography / Bitcoin / Peer-to-peer computing

We’ve found an error in our paper. In the threshold signature scheme that we used, there are restrictions on the threshold value. In particular if the key is shared over a degree t polynomial, then 2t + 1 players (not

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2014-06-03 22:44:00
740Cryptographic protocols / Internet protocols / Internet standards / Certificate policy / Public key certificate / Online Certificate Status Protocol / HTTP Secure / Digital signature / X.509 / Cryptography / Public-key cryptography / Key management

IGC BASIC HARDWARE UNAFFILIATED CERTIFICATE SUBSCRIBER AGREEMENT This IGC Basic Hardware Unaffiliated Certificate Subscriber Agreement (this “Agreement”) is made by and between IdenTrust (defined below) and You (defi

Add to Reading List

Source URL: secure.identrust.com

Language: English - Date: 2014-06-26 18:27:22
UPDATE