Public-key cryptography

Results: 11378



#Item
611Cryptography / Key management / Public key infrastructure / Public-key cryptography / Transport Layer Security / E-commerce / Permanent account number / Certificate authority / Public key certificate / Aadhaar / Identity document / Electronic authentication

IDENTITY VERIFICATION GUIDELINES Version 1.2 MarchController of Certifying Authorities

Add to Reading List

Source URL: cca.gov.in

Language: English - Date: 2016-04-18 00:36:25
612Cryptography / E-commerce / Key management / Public key certificate / Public key infrastructure / Public-key cryptography

Certificate according to the Renewable Energy Directive (RED) (DIRECTIVEEC of the EUROPEAN PARLIAMENT and of THE COUNCIL of 23 April 2009 on the promotion of the use of energy from renewable sources)

Add to Reading List

Source URL: www.ecosystemspa.com

Language: English - Date: 2014-10-01 05:35:17
613Cryptography / Public-key cryptography / Cryptographic protocols / Ciphertext indistinguishability / Homomorphic encryption / Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding / RSA / Secure multi-party computation / Chosen-ciphertext attack / Malleability / ID-based encryption

Controlled Functional Encryption Muhammad Naveed1 , Shashank Agrawal1 , Manoj Prabhakaran1 , Xiaofeng Wang2 , Erman Ayday3 , Jean-Pierre Hubaux3 and Carl A. Gunter1 1 University of Illinois at Urbana-Champaign

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-08-27 22:14:05
614Cryptography / Public-key cryptography / FiatShamir heuristic / Wallet / Advantage / Accumulator / Digital signature / Coin

Practical Divisible E-Cash Patrick Märtens Mathematisches Institut, Justus-Liebig-Universität Gießen April 9, 2015

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-09 08:38:48
615E-commerce / Financial cryptography / Payment systems / Public-key cryptography / Digital currencies / Ecash / DigiCash / Blind signature / Electronic money / Cryptographic protocol / RSA / Payment

Basic Security of the ecash Payment System? Berry Schoenmakers DigiCash Kruislaan 419 NL-1098 VA Amsterdam The Netherlands

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2008-05-11 02:51:51
616Public-key cryptography / Cryptographic protocols / Secure communication / Cryptographic software / Double Ratchet Algorithm / DiffieHellman key exchange / WhatsApp / Digital signature / XTR / Elliptic curve DiffieHellman / Signal

How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2016-05-24 15:16:00
617Integer factorization algorithms / Mathematics / Cryptography / Number theory / Quadratic sieve / Euclidean algorithm / RSA / Prime number / Factorization / Trial division / General number field sieve / Rational sieve

FACTORIZATION TECHNIQUES ELVIS NUNEZ AND CHRIS SHAW Abstract. The security of the RSA public key cryptosystem relies upon the computational difficulty of deriving the factors of a particular semiprime modulus. In this pa

Add to Reading List

Source URL: davidlowryduda.com

Language: English - Date: 2016-05-25 03:59:31
618Cryptography / Indian Jains / Sarabhai family / Academic degree / Email / Public key certificate

Vikram A. Sarabhai Community Science Centre (VASCSC), Ahmedabad Science Express – Climate Change Special (SECCS) Application Form

Add to Reading List

Source URL: sciencexpress.in

Language: English - Date: 2015-08-04 12:02:45
619Cryptography / Public-key cryptography / Password-authenticated key agreement / Eurocrypt / International Cryptology Conference / Asiacrypt / Digital signature / RSA

Fabrice Ben Hamouda--Guichoux Í 1 B rue du Pont RoyalBagneux, France

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2016-06-01 09:22:58
620Cryptography / Public-key cryptography / Cryptocurrencies / Key management / Bitcoin / Transport Layer Security / Blockchain / X.509 / Key / Ethereum / Man-in-the-middle attack / Unique key

Decentralized Public Key Infrastructure A White Paper from Rebooting the Web of Trust by (alphabetical by last name) Christopher Allen, Arthur Brock, Vitalik Buterin, Jon Callas, Duke Dorje, Christian Lundkvist, Pavel

Add to Reading List

Source URL: www.weboftrust.info

Language: English - Date: 2016-06-08 16:57:37
UPDATE