Cryptographic key types

Results: 19



#Item
1CERTICOM WHITEPAPER SERIES  ECC and SCADA Key Management Rob Lambert, Certicom August 2010

CERTICOM WHITEPAPER SERIES ECC and SCADA Key Management Rob Lambert, Certicom August 2010

Add to Reading List

Source URL: www.certicom.com

Language: English - Date: 2010-11-08 15:42:56
2Interfaces for Personal Identity Verification

Interfaces for Personal Identity Verification

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2016-02-16 14:47:45
3Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research  Alan Jeffrey

Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Alan Jeffrey

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:38:44
4Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Cambridge, UK  Alan Jeffrey

Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Cambridge, UK Alan Jeffrey

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:36:15
5This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
6Dynamic Types for Authentication ∗ Michele Bugliesi Riccardo Focardi Matteo Maffei Dipartimento di Informatica, Università Ca’ Foscari di Venezia, Via Torino 155, IMestre (Ve), Italy

Dynamic Types for Authentication ∗ Michele Bugliesi Riccardo Focardi Matteo Maffei Dipartimento di Informatica, Università Ca’ Foscari di Venezia, Via Torino 155, IMestre (Ve), Italy

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2009-01-08 08:47:19
7Foundations of Computer Security - Lecture 44: Symmetric vs. Asymmetric Encryption

Foundations of Computer Security - Lecture 44: Symmetric vs. Asymmetric Encryption

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2012-07-02 17:10:35
8Microsoft Word - D200 2-Updated22Jan2010.doc

Microsoft Word - D200 2-Updated22Jan2010.doc

Add to Reading List

Source URL: www.foi.se

Language: English - Date: 2012-06-18 09:13:05
9algo logic Algologic Research and Solutions Technical Report Negotiating public keys in asymmetric key cryptography

algo logic Algologic Research and Solutions Technical Report Negotiating public keys in asymmetric key cryptography

Add to Reading List

Source URL: www.freewebs.com

Language: English
10

PDF Document

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2012-10-24 11:27:31