Cryptographic key types

Results: 19



#Item
1Key management / Public-key cryptography / Cryptography / Elliptic curve cryptography / Key size / Key / Symmetric-key algorithm / RSA / Cipher / Elliptic curve DiffieHellman / DiffieHellman key exchange / Cryptographic key types

CERTICOM WHITEPAPER SERIES ECC and SCADA Key Management Rob Lambert, Certicom August 2010

Add to Reading List

Source URL: www.certicom.com

Language: English - Date: 2010-11-08 15:42:56
2Cryptography / FIPS 201 / Standards / Computer access control / Authentication / Smart card / PIV / Public-key cryptography / Cryptographic key types / RSA Security

Interfaces for Personal Identity Verification

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2016-02-16 14:47:45
3Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / Digital signature / XTR / Cryptographic protocol / Challengeresponse authentication / Security protocol notation / NeumanStubblebine protocol

Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Alan Jeffrey

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:38:44
4Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / XTR / Digital signature / Subtyping / Security protocol notation

Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Cambridge, UK Alan Jeffrey

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:36:15
5Kerberos / Key / Certificate authority / Symmetric-key algorithm / ID-based encryption / Cryptographic key types / Cryptography / Key management / Public-key cryptography

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
6Information / Reflection attack / Cryptographic nonce / Password authentication protocol / Public-key cryptography / Otway–Rees protocol / Needham–Schroeder protocol / Cryptography / Cryptographic protocols / Data

Dynamic Types for Authentication ∗ Michele Bugliesi Riccardo Focardi Matteo Maffei Dipartimento di Informatica, Università Ca’ Foscari di Venezia, Via Torino 155, IMestre (Ve), Italy

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2009-01-08 08:47:19
7Symmetric-key algorithm / Key size / Key / Cryptographic software / Cryptographic key types / Key encapsulation / Cryptography / Key management / Public-key cryptography

Foundations of Computer Security - Lecture 44: Symmetric vs. Asymmetric Encryption

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2012-07-02 17:10:35
8Public-key cryptography / Message authentication code / Key-agreement protocol / Key / Public key infrastructure / AKA / Symmetric-key algorithm / Cryptographic key types / Internet security / Cryptography / Cryptographic protocols / Key management

Microsoft Word - D200 2-Updated22Jan2010.doc

Add to Reading List

Source URL: www.foi.se

Language: English - Date: 2012-06-18 09:13:05
9Cipher / Key / Symmetric-key algorithm / Man-in-the-middle attack / Cryptographic key types / Cryptography / Key management / Public-key cryptography

algo logic Algologic Research and Solutions Technical Report Negotiating public keys in asymmetric key cryptography

Add to Reading List

Source URL: www.freewebs.com

Language: English
10Key / Encryption / Hardware security module / Cryptographic key types / Cryptography / Key management / Key size

PDF Document

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2012-10-24 11:27:31
UPDATE