PKCS 1

Results: 82



#Item
1KCLK

Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and `IC-derivatives Anna Inn-Tung Chen1 , Chia-Hsin Owen Chen2 , Ming-Shing Chen2 , Chen-Mou Cheng1 , and Bo-Yin Yang2??? 1

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-03-20 04:03:33
    2

    Bleichenbacher’s Attack Strikes Again: Breaking PKCS#1 v1.5 in XML Encryption? Tibor Jager,1 Sebastian Schinzel,2?? and Juraj Somorovsky3? ? ? 1 Institut f¨

    Add to Reading List

    Source URL: www.nds.rub.de

    Language: English - Date: 2012-12-19 07:57:36
      3Cryptography / Encodings / X.690 / Computing / Information / Abstract Syntax Notation One / PKCS 1 / Padding / Hash function / Octet / Cryptographic hash function / RSA

      ASN.1 parsing in crypto libraries: what could go wrong? Andrew Furtak, Yuriy Bulygin, Alex Bazhaniuk Advanced Threat Research

      Add to Reading List

      Source URL: www.intelsecurity.com

      Language: English - Date: 2016-05-02 12:28:32
      4Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Keystore / Key / Encryption / Digital signature / Certificate authority / PKCS

      Private Key Management Version: 1.1 Global Payments Europe, s.r.o. Created

      Add to Reading List

      Source URL: www.gpwebpay.cz

      Language: English - Date: 2016-08-01 14:50:14
      5Cryptography / Public-key cryptography / Public key infrastructure / Cryptographic protocols / Cryptography standards / X.509 / Internet Standards / PKCS / Code signing / Portable Executable / Public key certificate / Cryptographic Message Syntax

      Windows Authenticode Portable Executable Signature Format Version 1.0 — March 21, 2008  Abstract Authenticode® is a digital signature format that is used to determine the origin and integrity of software binaries. A

      Add to Reading List

      Source URL: download.microsoft.com

      Language: English - Date: 2008-07-29 12:01:34
      6Public-key cryptography / X.509 / Module:Hex/data table / RSA / OpenSSL / PKCS / Certificate authority / Table of bases

      All your private keys are belong to us 1 All your private keys are belong to us

      Add to Reading List

      Source URL: trapkit.de

      Language: English
      7Public-key cryptography / Cryptographic software / Cryptographic hash functions / Key management / Cryptography standards / Hardware security module / Microsoft CryptoAPI / RSA / PKCS / SHA-1 / Hash-based message authentication code / Digital signature

      LYNKS Series II Authentication HSM TM High-Assurance Hardware Security Module Specifically Designed for Authentication Applications

      Add to Reading List

      Source URL: www.spyrus.com

      Language: English - Date: 2015-08-05 12:42:41
      8Cryptography / Cryptography standards / FIPS 140-2 / FIPS 140 / Bouncy Castle / SHA-2 / Cryptographic Module Validation Program / Advanced Encryption Standard / Critical Security Parameter / Zeroisation / PKCS / AES implementations

      Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.1 Date:

      Add to Reading List

      Source URL: www.bouncycastle.org

      Language: English - Date: 2016-04-29 19:57:45
      UPDATE