Public-key cryptography

Results: 11378



#Item
461Cryptography / Ciphertext indistinguishability / Probabilistic encryption / Authenticated encryption / Cryptosystem / RSA / Encryption / Deterministic encryption / Block cipher mode of operation / Public-key cryptography / Ciphertext / Cipher

Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-08-24 18:12:50
462Public-key cryptography / X.509 / Module:Hex/data table / RSA / OpenSSL / PKCS / Certificate authority / Table of bases

All your private keys are belong to us 1 All your private keys are belong to us

Add to Reading List

Source URL: trapkit.de

Language: English
463Public-key cryptography / Cryptography / Encryption / Ciphertext indistinguishability / Attribute-based encryption / ID-based encryption / RSA / Cipher / Data Encryption Standard / Identity-based conditional proxy re-encryption / Semantic security

2015 IEEE Symposium on Security and Privacy Forward Secure Asynchronous Messaging from Puncturable Encryption Matthew D. Green and Ian Miers Department of Computer Science

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:14
464E-commerce / Key management / Public key certificate / Public key infrastructure / Public-key cryptography / Indian nationality law / Software copyright in China

CERTIFICATE APPLICATION Please check ONE:  Pioneer Certificate (in Idaho before 1890)  Early Settler (in Idaho before 31 DecA. Applicant: Name as it is to appear on certificate Street Address

Add to Reading List

Source URL: idahogenealogy.org

Language: English - Date: 2016-03-26 19:27:22
465E-commerce / Key management / Public key certificate / Public key infrastructure / Public-key cryptography / Employment

WHAT CAN I DO TO IMPROVE MY PACKAGE? The staff of the STA-21 program has been asked this question numerous times. We have compiled a few items that may help you in getting prepared for the next cycle. 1. The applicati

Add to Reading List

Source URL: www.sta-21.navy.mil

Language: English - Date: 2015-12-11 14:06:52
466Domain name system / Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Unbound / NSD / Comparison of DNS server software / BIND / Name server / NLnet

DNSSEC software at NLnet Labs Jelte Jansen http://www.nlnetlabs.nl/

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:02
467Public-key cryptography / Public key infrastructure / RSA / Schmidt-Samoa cryptosystem

Answers to Practice Questions for Exam 1 (Crypto Basics) Answer 1-Crypto: a) The three basic requirements that we discussed in class are: 1. Cryptosystem security: Roughly speaking, it must be infeasible for an eavesdrop

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2013-10-15 14:07:47
468E-commerce / Payment systems / Financial cryptography / Ubiquitous computing / Public-key cryptography / Radio-frequency identification / Contactless smart card / Ecash / Smart card / Digital signature / Authentication / Electronic money

Pay As You Go Foteini Baldimtsi1 , Gesine Hinterw¨alder2 , Andy Rupp3 , Anna Lysyanskaya1 , Christof Paar2,4 , Wayne P. Burleson2 1 Computer Science Department, Brown University

Add to Reading List

Source URL: vcsg.ecs.umass.edu

Language: English - Date: 2012-10-24 17:25:20
469Key management / Public-key cryptography / Public key infrastructure / E-commerce / Transport Layer Security / Public key certificate / BSI Group / Certification Practice Statement / Certificate authority / Trust service provider

Certificate of Registration TRUST SERVICE PROVIDER - ETSI TSv2.4.1 This is to certify that: KPN B.V. Fauststraat 1

Add to Reading List

Source URL: certificaat.kpn.com

Language: English - Date: 2016-06-28 10:00:02
470Cloud computing / Cloud storage / Cloud infrastructure / Cloud computing security / Computer security / Cloud applications / Public-key cryptography / Encryption / Crypto cloud computing / Perspecsys

nternational Journal & Magazine of Engineering, Technology, Management and Research Volume 1, Issue 10, October

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-13 08:43:18
UPDATE