<--- Back to Details
First PageDocument Content
Cryptography / Public key infrastructure / Key management / Public-key cryptography / E-commerce / Transport Layer Security / DigiCert / CyberTrust / Public key certificate / CA/Browser Forum / X.509 / Online Certificate Status Protocol
Date: 2016-03-04 15:15:05
Cryptography
Public key infrastructure
Key management
Public-key cryptography
E-commerce
Transport Layer Security
DigiCert
CyberTrust
Public key certificate
CA/Browser Forum
X.509
Online Certificate Status Protocol

Microsoft Word - DigiCert_CPS_v409.doc

Add to Reading List

Source URL: www.digicert.com

Download Document from Source Website

File Size: 609,95 KB

Share Document on Facebook

Similar Documents

Cryptography / Multivariate cryptography / Finite fields / Post-quantum cryptography / Hidden Field Equations / Unbalanced Oil and Vinegar / Trapdoor function / XTR / QUAD / Mutation / Digital signature

-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography Jintai Ding1, , Christopher Wolf2 , and Bo-Yin Yang3, 1 University of Cincinnati and Technische Universität Darmstadt

DocID: 1xVV9 - View Document

Cryptography / Post-quantum cryptography / Multivariate cryptography / Finite fields / Lattice-based cryptography / Hidden Field Equations / Learning with errors / QUAD / RSA / Reduction / Computational hardness assumption / Ideal lattice cryptography

Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3

DocID: 1xVNp - View Document

Algebra / Mathematics / Abstract algebra / Polynomials / Computer algebra / Multivariate cryptography / Algebraic geometry / Equations / Hidden Field Equations / Factorization / Quadratic function / Grbner basis

Multivariate Public Key Cryptography Jintai Ding 1 2

DocID: 1xVdX - View Document

Cryptography / Hashing / Search algorithms / Cryptographic hash functions / Error detection and correction / Hash function / Digital signature / Collision resistance / Hash / Trapdoor function / Security of cryptographic hash functions

This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,

DocID: 1xTwC - View Document

Why Johnny the Developer Can’t Work with Public Key Certificates? An Experimental Study of OpenSSL Usability Martin Ukrop[0000−0001−8110−8926] and Vashek Matyas Centre for Research on Cryptography and Security Fa

DocID: 1vi5X - View Document