Back to Results
First PageMeta Content
Public-key cryptography / NTRUSign / Lamport signature / NTRU / Digital signature / Lattice-based cryptography / Merkle signature scheme / ID-based encryption / Key / Cryptography / Post-quantum cryptography / Key management


Document Date: 2009-04-08 18:56:03


Open Document

File Size: 156,36 KB

Share Result on Facebook

City

Bureau Drive Gaithersburg / Mathematics / /

Company

MIT Laboratory / Jet Propulsion Laboratory / Quantum / Bernstein / SRI International / /

Country

Netherlands / /

Currency

pence / /

/

Facility

National Institute of Standards and Technology / Stanford University / University of Amsterdam / California Institute of Technology / /

IndustryTerm

Rapid solution / resistant algorithms / covers public key cryptographic algorithms / secure protocols / Online Certificate Status Protocol / database search / multivariate systems / symmetric encryption algorithms / mechanical systems / mechanical algorithm / cryptographic hash algorithms / secrecy systems / conjugacy search problem / search algorithm / public key algorithms / public key cryptographic algorithm / search problems / search algorithms / public key cryptographic algorithms / cryptographic protocols / Internet Public Key Infrastructure / contemporary computing platforms / polynomial time algorithm / cryptographic algorithms / hash algorithms / straightforward solution / computing / Internet users / constrained devices / volume server / /

Organization

California Institute of Technology / MIT / U.S. Government / Department of Mathematics / National Institute of Standards and Technology / University of Amsterdam / Stanford University / /

Person

Key Size / O. Rabin / David A. Cooper / Ralph Merkle / Ray A. Perlner / /

Position

guard / SVP / General / /

Product

Franklin / /

ProvinceOrState

Maryland / California / /

PublishedMedium

Journal of the ACM / the Theory of Computing / International Journal of Theoretical Physics / Cryptology ePrint Archive / Mathematics of Computation / IEEE Transactions on Information Theory / Communications of the ACM / the Siam Journal / /

SportsLeague

Stanford University / /

Technology

Public Key Infrastructure / McEliece encryption / public key algorithms / polynomial time algorithm / search algorithm / Status Protocol / search algorithms / public key cryptographic algorithms / PKI / RSA encryption / Data Encryption / Identity-based encryption / 5 covers public key cryptographic algorithms / Private key / secret key / public key cryptographic algorithm / two algorithms / public key encryption / encryption / w/Merkle 1 1 1 240 signatures McEliece Encryption / Cryptography / Public Key / McEliece algorithms / symmetric encryption algorithms / cryptographic hash algorithms / hash algorithms / Digital Signature / CONSIDERATIONS FOR PROTOCOL / /

URL

http /

SocialTag