Public-key cryptography

Results: 11378



#Item
311Cryptography / Kitemark / Product safety / Public key certificate / BSI

Certificate of Registration INFORMATION SECURITY MANAGEMENT SYSTEM - ISO/IEC 27001:2013 This is to certify that: ATM S.A. Data Center ATMAN

Add to Reading List

Source URL: ru.atman.pl

Language: English - Date: 2015-09-18 06:10:27
312Cryptography / Public-key cryptography / Homeomorphisms / Homomorphic encryption / Malleability / CramerShoup cryptosystem / Semantic security / Plaintext-aware encryption / ElGamal encryption / Cryptosystem / RSA / Random oracle

Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. Consider an electronic election scheme implemented using a

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:51:39
313Cryptography / Integer sequences / Integer factorization algorithms / Primality tests / Safe prime / Finite fields / RSA / Prime number / Strong prime / Blum integer / Trial division / Quadratic sieve

The Million-Key Question—Investigating the Origins of RSA Public Keys Petr Švenda, Matúš Nemec, Peter Sekan, Rudolf Kvašňovský, David Formánek, David Komárek, and Vashek Matyáš, Masaryk University https://www

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-08-10 03:08:02
314Notary / Law / Common law / Cryptography / Statutory declaration / Notary public / Declarant / Act / Public key certificate

STATUTORY DECLARATION I/We of

Add to Reading List

Source URL: www.delwp.vic.gov.au

Language: English - Date: 2015-07-26 21:42:32
315Cryptography / Key management / Public key infrastructure / Public-key cryptography / Certificate authorities / Transport Layer Security / Comodo Group / Public key certificate / Comodo Internet Security / Code signing / Comodo / Phishing

Centrally Managing Trust, Security & Compliance in Educational Institutions Public Key Infrastructure (PKI) CASE STUDY: Education SSL Certificate Management Too many SSLCertificates, Not EnoughTime Large, thriving enterp

Add to Reading List

Source URL: www.instantssl.cn

Language: English
316Cryptography / Signature / Cryptography standards / Computer law / Key management / Public-key cryptography / Electronic signature / EIDAS / Qualified electronic signature / Digital signature / PAdES / Biometrics

Much More Than Capturing a Signature Get Documents Signed. Anywhere. Any time. The E-Signature Solution Based on Open PDF Standards and True Digital Signatures.

Add to Reading List

Source URL: konferencje.alebank.pl

Language: English - Date: 2016-06-09 10:27:46
317Cryptography / Key management / Public key infrastructure / Public-key cryptography / E-commerce / Public key certificate / Professional certification

Certificate The fascination of Quality Certification Code: ASC-C-00164

Add to Reading List

Source URL: www.catchmorefish.ch

Language: English - Date: 2016-03-21 12:24:06
318Cryptography / Key management / Public administration / Public-key cryptography / Transport Layer Security / Identity management / Identity document / Authentication / E-government / Smart card / Certificate authority / Citizen Card

The state-of-the-art online ID card A great success in Taiwan Easy, secure and user-friendly Background

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:41
319Cryptography / Public-key cryptography / Finite fields / Ciphertext indistinguishability / Digital signature / Oblivious transfer / Communications protocol / Random oracle / XTR / RSA / Commitment scheme / Advantage

The Simplest Protocol for Oblivious Transfer Tung Chou1 and Claudio Orlandi2 1 Technische Universieit Eindhoven 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-06-04 01:58:11
320Cryptography / Public-key cryptography / Key management / Internet privacy / Transport Layer Security / Secure messaging / Threema / ID-based encryption / Man-in-the-middle attack / Email encryption / Key exchange / WhatsApp

2015 IEEE Symposium on Security and Privacy SoK: Secure Messaging1 ∗ Nik Unger∗ , Sergej Dechand†

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:11
UPDATE