PKCS 1

Results: 82



#Item
1Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and `IC-derivatives Anna Inn-Tung Chen1 , Chia-Hsin Owen Chen2 , Ming-Shing Chen2 , Chen-Mou Cheng1 , and Bo-Yin Yang2??? 1

Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and `IC-derivatives Anna Inn-Tung Chen1 , Chia-Hsin Owen Chen2 , Ming-Shing Chen2 , Chen-Mou Cheng1 , and Bo-Yin Yang2??? 1

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-03-20 04:03:33
    2Bleichenbacher’s Attack Strikes Again: Breaking PKCS#1 v1.5 in XML Encryption? Tibor Jager,1 Sebastian Schinzel,2?? and Juraj Somorovsky3? ? ? 1  Institut f¨

    Bleichenbacher’s Attack Strikes Again: Breaking PKCS#1 v1.5 in XML Encryption? Tibor Jager,1 Sebastian Schinzel,2?? and Juraj Somorovsky3? ? ? 1 Institut f¨

    Add to Reading List

    Source URL: www.nds.rub.de

    Language: English - Date: 2012-12-19 07:57:36
      3ASN.1 parsing in crypto libraries: what could go wrong? Andrew Furtak, Yuriy Bulygin, Alex Bazhaniuk Advanced Threat Research

      ASN.1 parsing in crypto libraries: what could go wrong? Andrew Furtak, Yuriy Bulygin, Alex Bazhaniuk Advanced Threat Research

      Add to Reading List

      Source URL: www.intelsecurity.com

      Language: English - Date: 2016-05-02 12:28:32
      4Private Key Management Version: 1.1 Global Payments Europe, s.r.o. Created

      Private Key Management Version: 1.1 Global Payments Europe, s.r.o. Created

      Add to Reading List

      Source URL: www.gpwebpay.cz

      Language: English - Date: 2016-08-01 14:50:14
      5Cryptography / Public-key cryptography / Public key infrastructure / Cryptographic protocols / Cryptography standards / X.509 / Internet Standards / PKCS / Code signing / Portable Executable / Public key certificate / Cryptographic Message Syntax

      Windows Authenticode Portable Executable Signature Format Version 1.0 — March 21, 2008  Abstract Authenticode® is a digital signature format that is used to determine the origin and integrity of software binaries. A

      Add to Reading List

      Source URL: download.microsoft.com

      Language: English - Date: 2008-07-29 12:01:34
      6All your private keys are belong to us  1 All your private keys are belong to us

      All your private keys are belong to us 1 All your private keys are belong to us

      Add to Reading List

      Source URL: trapkit.de

      Language: English
      7LYNKS Series II Authentication HSM TM High-Assurance Hardware Security Module Specifically Designed for Authentication Applications

      LYNKS Series II Authentication HSM TM High-Assurance Hardware Security Module Specifically Designed for Authentication Applications

      Add to Reading List

      Source URL: www.spyrus.com

      Language: English - Date: 2015-08-05 12:42:41
      8Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.1 Date:

      Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.1 Date:

      Add to Reading List

      Source URL: www.bouncycastle.org

      Language: English - Date: 2016-04-29 19:57:45