Public-key cryptography

Results: 11378



#Item
411Payment systems / Key management / Public key infrastructure / Public-key cryptography / Voucher / School voucher / Certificate authority / Public key certificate / Smart card / Credit card / Security token

Department of Defense PKI ECA CERTIFICATES VOUCHER ORDER FORM Use this form to purchase 5+ IdenTrust ECA Certificates using a company purchase order or credit card.  

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-03-04 17:45:08
412Computer access control / Key management / Access control / Public-key cryptography / Identity management / Simple public-key infrastructure / Authorization certificate / Authentication / Public key infrastructure / Delegation / PERMIS / Authorization

Delegation Logic: A Logic-based Approach to Distributed Authorization NINGHUI LI Stanford University BENJAMIN N. GROSOF Massachusetts Institute of Technology

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2002-12-29 15:33:54
413Public-key cryptography / Public key infrastructure / Key management / Transport Layer Security / Cryptographic protocols / Certificate policy / Certificate authority / Public key certificate / Revocation list / X.509 / Kek / GLite

KEK GRID CA Service Certificate Policy and Certificate Practices Statements Ver

Add to Reading List

Source URL: gridca.kek.jp

Language: English - Date: 2008-04-02 05:21:26
414Foreign exchange market / International finance / WDX Institute / WOCU / World currency unit / Currency basket / World currency / Public-key cryptography / Tamper-evident technology

CASE STUDY Global Currency Stabilization Independently monitored and provable currency stabilization

Add to Reading List

Source URL: www.wocu.com

Language: English - Date: 2015-06-08 04:54:09
415Internet Standards / Internet protocols / Dark web / Internet privacy / Onion routing / Routing / Crowds / Communications protocol / Tor / Proxy server / Public-key cryptography / Anonymity

A Model of Onion Routing with Provable Anonymity Joan Feigenbaum1? , Aaron Johnson1?? , and Paul Syverson2? ? ? 1 Yale University {Joan.Feigenbaum, aaron.johnson}@yale.edu

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2007-01-12 11:50:43
416Group theory / Finite fields / Public-key cryptography / Cryptography / Key management / Discrete logarithm / Index calculus algorithm / ElGamal encryption / Key / XTR / DiffieHellman key exchange / RSA

Master’s thesis in Mathematics The use of elliptic curves in cryptography by Gijsbert van Vliet

Add to Reading List

Source URL: www.math.ru.nl

Language: English - Date: 2016-04-18 16:34:53
417Cryptography / Symmetric-key algorithm / Cipher / Encryption / Public-key cryptography / RSA / Key / Block cipher mode of operation / Multiple encryption

Microsoft PowerPoint - Geoencryption Authentication Di Qiu May 2006.ppt

Add to Reading List

Source URL: gps.stanford.edu

Language: English - Date: 2006-06-13 19:25:54
418Elliptic curve cryptography / Public-key cryptography / RSA / Common Criteria / Side-channel attack / Evaluation

Microsoft PowerPoint - Killmann_sca_ecc.ppt

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2010-08-31 09:40:00
419Cryptography / Post-quantum cryptography / Learning with errors / Lattice-based cryptography / Quantum computing / Normal distribution / Probability distribution / XTR / Lattice / Public-key cryptography / Transport Layer Security / Ideal lattice cryptography

Post-quantum key exchange – a new hope Erdem Alkim1 , Léo Ducas2 , Thomas Pöppelmann3 , and Peter Schwabe4 ? 1

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2015-12-08 11:13:38
420Secure communication / Public-key cryptography / Key management / Cryptographic protocols / Internet Standards / Cipher suite / Transport Layer Security / Elliptic curve cryptography / Elliptic curve DiffieHellman / Key size / Key / Client certificate

Network Working Group Request for Comments: 4492 Category: Informational S. Blake-Wilson SafeNet

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-04 15:25:45
UPDATE