RSA

Results: 5605



#Item
211Cryptography / Public-key cryptography / Key management / Digital signature / Post-quantum cryptography / Key / Elliptic Curve Digital Signature Algorithm / RSA / Cryptographic hash function / Merkle signature scheme / Lamport signature

State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1 Cisco Systems, USA

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-04-06 13:04:46
212E-commerce / RSA / Trapdoor function / Euclidean algorithm / Water / Sheaf / XTR

Extending Nymble-like Systems Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,iang}@cs.uwaterloo.ca

Add to Reading List

Source URL: homes.soic.indiana.edu

Language: English - Date: 2016-05-12 20:00:31
213Public-key cryptography / Cryptographic software / Cryptographic hash functions / Key management / Cryptography standards / Hardware security module / Microsoft CryptoAPI / RSA / PKCS / SHA-1 / Hash-based message authentication code / Digital signature

LYNKS Series II Authentication HSM TM High-Assurance Hardware Security Module Specifically Designed for Authentication Applications

Add to Reading List

Source URL: www.spyrus.com

Language: English - Date: 2015-08-05 12:42:41
214Public-key cryptography / Key management / Simple public-key infrastructure / Authorization certificate / Public key infrastructure / X.509 / Public key certificate / MD5 / Digital signature / NP / RSA

Journal of Computer Security–322 IOS Press 285 Certificate chain discovery in SPKI/SDSI

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2016-07-18 22:33:05
215Pseudorandom number generators / Cryptography / Pseudorandomness / Randomness / Information theory / Random number generation / Dual EC DRBG / Fortuna / Pseudorandom generator / RdRand / RSA Security / PRGS

The proceedings version of this paper appears in CRYPTOThis is a preliminary full version. Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results Jean Paul Degabriele1 , Kenneth G. Pat

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-06-03 14:14:07
216

Morbi-RSA Eine Bestandsaufnahme nach dem ersten Jahr Morbi-RSA Warum braucht man einen Morbi-RSA? Hat der Morbi-RSA seine Ziel erreicht?

Add to Reading List

Source URL: aok-bv.de

Language: German - Date: 2016-01-27 06:38:16
    217Cryptography / Applied mathematics / Stream ciphers / Public-key cryptography / E-commerce / RSA / Cryptanalysis / Vigenre cipher / Block cipher / Cipher / Hill cipher / Finite field

    Final Topicsand 5440 students cover the same material, but 5440 students may find slightly more emphasis on their midterm on definitions, proofs and logical deductions instead of algorithms and computations. With

    Add to Reading List

    Source URL: math.colorado.edu

    Language: English - Date: 2015-10-18 16:52:38
    218Traffic law / Street furniture / Road transport / Road safety / Trucks / Traffic collision / Towing / Traffic light / Traffic / Guard rail / Car / Road traffic safety

    STATE OF NEW HAMPSHIRE Department of Safety Division of Motor Vehicles MOTOR VEHICLE ACCIDENT REPORT N.H.RSA 264:25 – REPORTING REQUIRMENTS

    Add to Reading List

    Source URL: www.sandwichnh.org

    Language: English - Date: 2014-09-10 11:02:32
    219Public-key cryptography / Cryptography / Financial cryptography / Key management / Blind signature / Electronic voting / Undeniable signature / Digital signature / Blinding / David Chaum / Ring signature / RSA

    United States Patent] Chaum

    Add to Reading List

    Source URL: www.chaum.com

    Language: English - Date: 2015-05-26 20:08:19
    220Digital typography / Cryptography / Visual cryptography / RSA / PostScript / Python / Command-line interface / Moni Naor / C / Adi Shamir

    VCK: the Visual Cryptography Kit Frank Stajano Olivetti Oracle Research Laboratory & University of Cambridge Computer Laboratory The idea of visual cryptography is a fascinating invention by Moni Naor and Adi Shamir (199

    Add to Reading List

    Source URL: legacy.python.org

    Language: English - Date: 2006-05-04 17:09:08
    UPDATE