Strong cryptography

Results: 135



#Item
41RSA / Ring signature / BLS / Schnorr signature / Strong RSA assumption / Model theory / Forking lemma / Group signature / Blind signature / Cryptography / Public-key cryptography / Digital signature

Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures S. Sharmila Deva Selvi, S. Sree Vivek! , C. Pandu Rangan! Theoretical Computer Science Laboratory, Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-21 04:48:54
42Digital signature / Electronic signature / Security token / Signature / PDF/A / Digital signatures and law / Cryptography / Notary / PAdES

Legal Weight Electronic Signatures Cut Cost Strong Security

Add to Reading List

Source URL: www.securemetric.com

Language: English - Date: 2014-05-28 02:53:53
43Security token / Two-factor authentication / One-time password / Software token / Authentication / Password / Strong authentication / Password manager / Anakam / Security / Computer security / Cryptography

Advanced Authentication Methods: Software vs. Hardware

Add to Reading List

Source URL: www.ca.com

Language: English - Date: 2013-04-26 09:39:23
44Key management / /dev/random / Unix / Random number generation / Cryptographic hash function / Entropy / Padding / Pseudorandomness / Fortuna / Cryptography / Randomness / Pseudorandom number generators

The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 Software Generation of Practically Strong Random Numbers

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2002-04-30 18:06:39
45One-time password / Password / Keystroke logging / Two-factor authentication / Salt / Transaction authentication number / Malware / Key derivation function / Password cracking / Security / Computer security / Cryptography

How does two-factor authentication protect my users? Passwords are not strong enough for secure authentication on the web anymore. Even with complicated requirements and heavy hashing, passwords remain vulnerable to comm

Add to Reading List

Source URL: getclef.com

Language: English - Date: 2015-04-10 13:24:37
46Computer crimes / Password / Passphrase / Keystroke logging / Crypt / Brute-force attack / Key derivation function / Transaction authentication number / Phishing / Cryptography / Security / Computer security

Proc. HotSec ’07 Do Strong Web Passwords Accomplish Anything? Dinei Florencio,

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2008-11-29 12:03:58
47Certificate authorities / Cryptographic protocols / Electronic commerce / Comodo Group / Transport Layer Security / Public key certificate / X.509 / Verisign / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management

Why strong Validation processes for SSL are essential for the preservation of trust in the Internet economy Weak validation processes undermine the value of SSL as a trust enabling technology

Add to Reading List

Source URL: www.instantssl.com

Language: English - Date: 2014-07-25 21:23:24
48Elliptic curve / Lenstra elliptic curve factorization / Discrete logarithm / XTR / Elliptic Curve DSA / Prime number / Cyclic group / Hyperelliptic curve cryptography / Hessian form of an elliptic curve / Abstract algebra / Finite fields / Elliptic curve cryptography

Reverse Engineering of Strong CryptoSignatures Schemes

Add to Reading List

Source URL: www.reteam.org

Language: English - Date: 2009-05-17 13:10:56
49Internet privacy / Cryptographic software / Pretty Good Privacy / Phil Zimmermann / Strong cryptography / Web of trust / Internet security / Cryptanalysis / Cipher / Cryptography / Public-key cryptography / PGP

An Introduction to Cryptography Copyright © [removed]Network Associates, Inc. and its Affiliated Companies. All Rights Reserved. PGP*, Version 6.0

Add to Reading List

Source URL: cdn.preterhuman.net

Language: English - Date: 2012-10-01 15:16:15
50Cryptography / Password / Cryptographic software / Roboform / Password policy / LastPass Password Manager / Password strength / Security / Computer security / Access control

Tip Sheet Creating strong, safe passwords Ensuring the security of multiple online accounts might seem like a big task, but it’s really important you don’t use the same password for everything. Data breaches of well

Add to Reading List

Source URL: www.accan.org.au

Language: English - Date: 2015-03-05 20:32:56
UPDATE