Public-key cryptography

Results: 11378



#Item
601Payment systems / Key management / Public key infrastructure / Public-key cryptography / Computer access control / Voucher / School voucher / Certificate authority / Smart card / Security token / Public key certificate / Credit card

IdenTrust Global Common (IGC) VOUCHER ORDER FORM Use this form to purchase 5+ IdenTrust Global Common (IGC) vouchers if using a credit card, or 1+ if using a purchase order for payment.  

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-03-04 17:45:08
602Public-key cryptography / Secure multi-party computation / Homomorphic encryption / Algorithm / Block cipher mode of operation / Communications protocol / Cryptographic protocol

Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum SAP Research Karlsruhe, Germany

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2013-03-24 11:27:34
603E-commerce / Payment systems / Key management / Public key certificate / Public key infrastructure / Public-key cryptography / Post-office box / Money order / Diploma / West Virginia University

West Virginia University Replacement Diploma & Certificate Form The name under which you attended WVU Student ID or Social Security Number

Add to Reading List

Source URL: assets.slate.wvu.edu

Language: English - Date: 2016-07-12 08:16:12
604Internet Standards / Computer networks / Cryptographic protocols / AS2 / Computer data / Electronic data interchange / Public-key cryptography / AS1 / AS4

  WHITE PAPER   The Next age of B2B file transfer; Why AS2 messaging would drive the World

Add to Reading List

Source URL: downloads.adroitlogic.com

Language: English - Date: 2016-02-24 04:42:27
605Cryptography / Public-key cryptography / Digital signature / RSA / Ciphertext indistinguishability / Random oracle

This is the Full Version of the Extended Abstract that appears in the Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’February – 1 March 2013, Nara, Ja

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-02-21 09:51:42
606Public-key cryptography / Semantics / Inter-process communication / Communications protocol / Data transmission / Interpretation / Futures and promises / Digital signature / Logic / Language / Computing

Programming Cryptographic Protocols

Add to Reading List

Source URL: evenmere.org

Language: English - Date: 2008-06-23 13:35:58
607

15th IACR International Conference on Practice and Theory in Public Key Cryptography PKC 2012 Darmstadt, May 21-23, 2012 Conference Program

Add to Reading List

Source URL: pkc2012.cased.de

Language: English - Date: 2012-05-15 13:55:28
    608Key management / Public key infrastructure / Public-key cryptography / Cryptographic protocols / Transport Layer Security / Public key certificate / X.509 / DocuSign / Online Certificate Status Protocol / SCVP / Authentication / Key

        DocuSign  Confidential    

    Add to Reading List

    Source URL: certificates.docusign.com

    Language: English - Date: 2014-02-21 18:55:48
    609Finite fields / Group theory / Logarithms / Public-key cryptography / Computer algebra / Discrete logarithm / CantorZassenhaus algorithm / Index calculus algorithm / Baby-step giant-step / Exponentiation / DiffieHellman key exchange / Algorithm

    Public Key Cryptography Using Discrete Logarithms in Finite Fields: Algorithms, Efficient Implementation and Attacks L. Maurits)

    Add to Reading List

    Source URL: www.luke.maurits.id.au

    Language: English - Date: 2016-04-23 00:53:29
    610Cryptography / BSI Group / International Electrotechnical Commission / Public key certificate / BSI / Film speed

    Certificate of Registration QUALITY MANAGEMENT SYSTEM - ISO 13485:2003 This is to certify that: AlloSource 6278 South Troy Circle

    Add to Reading List

    Source URL: www.allosource.org

    Language: English - Date: 2014-08-29 12:14:10
    UPDATE