<--- Back to Details
First PageDocument Content
Cryptographic protocols / Internet protocols / Online Certificate Status Protocol / X.509 / Signcryption / Elliptic curve cryptography / Pretty Good Privacy / S/MIME / Man-in-the-middle attack / Cryptography / Public-key cryptography / Internet standards
Date: 2012-03-19 20:00:30
Cryptographic protocols
Internet protocols
Online Certificate Status Protocol
X.509
Signcryption
Elliptic curve cryptography
Pretty Good Privacy
S/MIME
Man-in-the-middle attack
Cryptography
Public-key cryptography
Internet standards

Add to Reading List

Source URL: arxiv.org

Download Document from Source Website

File Size: 478,35 KB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Signcryption / Cryptographic primitive / Ciphertext indistinguishability / Key

Functional Signcryption: Notion, Construction, and Applications by Pratish Datta joint work with

DocID: 1qeWc - View Document

Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps Paulo S. L. M. Barreto2 , Benoˆıt Libert3⋆ , Noel McCullagh1⋆⋆ , and Jean-Jacques Quisquater3 1

DocID: 1nDj4 - View Document

Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt” Yang Wang1 , Mark Manulis2 , Man Ho Au1 , and Willy Susilo1, 1

DocID: 1m4eG - View Document

Cryptography / Public-key cryptography / Signcryption / Authenticated encryption / Cryptographic protocol / Secure channel / Key authentication / Serge Vaudenay / Encryption / Block cipher / Draft:C. Pandu Rangan / Index of cryptography articles

- Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

DocID: 1lBQV - View Document

Building Better Signcryption Schemes with Tag-KEMs Tor E. Bjørstad1 and Alexander W. Dent2 1 The Selmer Center, Department of Informatics,

DocID: 1enj2 - View Document