Digital Signature Standard

Results: 72



#Item
1

Foxit PhantomPDF Certified Compliant with SAFE-BioPharma® Digital Signature Standard Certification Addresses Critical Industry Need for Proof of Identity Associated with Digital Signatures on Regulatory Submissions FREM

Add to Reading List

Source URL: www.safe-biopharma.org

- Date: 2016-05-02 16:01:15
    2Cryptography / Radio-frequency identification / Data Encryption Standard / Automatic identification and data capture / Wireless / Feistel cipher / Singulation / Advanced Encryption Standard / Stream cipher / Digital signature / Digital signature transponder

    Proceedings - NN - RFIDSec08

    Add to Reading List

    Source URL: events.iaik.tugraz.at

    Language: English - Date: 2008-07-17 01:40:17
    3Online banking / Computer access control / Cryptography / Notary / Barcodes / Electronic Banking Internet Communication Standard / QR code / Digital signature / Transaction authentication number / Authentication / Encryption / Computer security

    PPI Sign app Secure login to portals via smartphone Portal login and EBICS signatures via smartphone in accordance with the minimum requirements for the security of internet payments

    Add to Reading List

    Source URL: www.ppi.de

    Language: English - Date: 2015-10-28 10:41:38
    4Cryptography / Cryptographic hash functions / Hashing / Message authentication codes / Error detection and correction / Secure Hash Algorithm / SHA-2 / Secure Hash Standard / SHA-1 / SHA-3 / Crypt / Digital Signature Algorithm

    FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

    Add to Reading List

    Source URL: nvlpubs.nist.gov

    Language: English - Date: 2015-08-04 11:33:21
    5Diffie–Hellman problem / Full Domain Hash / Rabin signature algorithm / Oracle machine / Optimal asymmetric encryption padding / Digital signature / Schnorr signature / Standard model / RSA / Cryptography / Public-key cryptography / Random oracle

    THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

    Add to Reading List

    Source URL: cacr.uwaterloo.ca

    Language: English - Date: 2015-05-02 08:19:13
    6

    2003 Paper 8 Question 6 Security (a) The Digital Signature Standard is computed using the following equations: r = (g k mod p) (mod q) s = (h(M ) − xr)/k (mod q)

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    - Date: 2014-06-09 10:17:55
      7Notary / Two-factor authentication / Authentication / Digital signature / Cryptography / Security / Civil law

      FIDO U2F Raw Message Formats FIDO Alliance Proposed Standard 09 October 2014 This version: http://www.fidoalliance.org/specs/fido­u2f­raw­message­formats­v1.0­ps­html Previous version: http://

      Add to Reading List

      Source URL: fidoalliance.org

      Language: English - Date: 2015-03-30 14:08:30
      8ID-based encryption / RSA / Digital signature / Standard model / Encryption / Cryptography / Public-key cryptography / Signcryption

      Public-Key Cryptography with Joint and Related-Key Security Susan Thomson Thesis submitted to the University of London for the degree of Doctor of Philosophy

      Add to Reading List

      Source URL: www.isg.rhul.ac.uk

      Language: English - Date: 2014-10-10 11:06:02
      9Forking lemma / Random oracle / Preimage attack / Digital signature / Collision resistance / Elliptic Curve DSA / Standard model / MD5 / Birthday attack / Cryptography / Cryptographic hash functions / Schnorr signature

      Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, Switzerland

      Add to Reading List

      Source URL: www.neven.org

      Language: English - Date: 2012-04-18 06:08:49
      10Cryptography / Computing / Digital signature / Public-key cryptography / Structure / Append / Parity of a permutation / Signature / Sha / Mathematics / Model theory / Universal algebra

      Secure Efficient History-Hiding Append-Only Signatures in the Standard Model Benoˆıt Libert Marc Joye

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2015-03-31 04:04:52
      UPDATE