PKCS

Results: 351



#Item
61IEEE P1363 / SPEKE / Secure Remote Password protocol / Encrypted key exchange / Password / PKCS / Key-agreement protocol / Key exchange / Elliptic curve cryptography / Cryptography / Cryptographic protocols / Password-authenticated key agreement

PDF Document

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-04-27 09:53:57
62X.509 / RSA / Public key certificate / Padding / Digital signature / Cryptographic hash function / Arjen Lenstra / PKCS / Collision attack / Cryptography / Public-key cryptography / MD5

Colliding X.509 Certificates version 1.0, 1st March 2005 Arjen Lenstra1,2 , Xiaoyun Wang3 , and Benne de Weger2 1

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2005-03-01 03:48:44
63Electronic commerce / PKCS / RSA / Cryptographic software / Cryptography / Public-key cryptography / Advanced Encryption Standard

SECURE MICROCONTROLLER   SOLUTIONS Applications •  Internet of Things •  Energy and Water

Add to Reading List

Source URL: www.insidesecure.com

Language: English
64Proteins / Apoptosis / Programmed cell death / Non-homologous end joining / DNA-PKcs / H2AFX / Ataxia telangiectasia mutated / Homologous recombination / AKT / Biology / DNA repair / Cellular processes

MutS homologue hMSH5: role in cisplatin-induced DNA damage response

Add to Reading List

Source URL: www.molecular-cancer.com

Language: English
65Smart cards / Cryptographic software / Windows XP / PKCS / Firefox / Windows / Microsoft CryptoAPI / Netscape / Two-factor authentication / Software / Microsoft Windows / Cryptography standards

Rosetta Common Services Interface™ Version 6.0 Rosetta Common Services Interface (Rosetta CSI™), the software component of Rosetta Executive Suite™, provides utilities for managing security devices, certificates, a

Add to Reading List

Source URL: autonomicresources.com

Language: English - Date: 2012-12-12 15:19:13
66RSA / Full Domain Hash / Cryptographic hash function / Random oracle / PKCS / Lamport signature / Rabin signature algorithm / Cryptography / Public-key cryptography / Digital signature

Chapter 12 Digital signatures In the public key setting, the primitive used to provide data integrity is a digital signature scheme. In this chapter we look at security notions and constructions for this primitive.

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:36:52
67X.509 / Public key infrastructure / PKCS / Credential / Cryptographic nonce / Cryptography / Public-key cryptography / Digital signature

Alpaca: Extensible Authorization for Distributed Services Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, Robert Morris, and M. Frans Kaashoek MIT CSAIL Cambridge, MA, USA {ctl,

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2009-11-10 14:15:06
68Hardware security module / XTR / Key management / Pseudonymity / Security Assertion Markup Language / PKCS / Cryptography / Public-key cryptography / ElGamal encryption

Werking van het eID Stelsel

Add to Reading List

Source URL: www.eid-stelsel.nl

Language: English - Date: 2014-12-23 06:24:06
69IronKey / USB / PKCS / Key / Password / Skype security / Security token / Cryptography / Public-key cryptography / Cryptographic software

Microsoft Word - 11c - H350 SP .doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-13 09:22:01
70Cryptographic protocols / Online Certificate Status Protocol / X.509 / OMA DRM / Revocation list / Public key certificate / PKCS / Rights Object Acquisition Protocol / Public key infrastructure / Cryptography / Public-key cryptography / Key management

Microsoft Word - CMLA-Technical-Specification-V1Approved.docx

Add to Reading List

Source URL: www.cm-la.com

Language: English - Date: 2014-01-09 13:17:00
UPDATE