Public-key cryptography

Results: 11378



#Item
751Smart grid / Electric power distribution / Emerging technologies / Elliptic curve cryptography / Itron / Public services / Smart meter / Automatic meter reading / ANSI C12.22 / BlackBerry Limited / Meter data management / Key

Itron Secures Metering Systems with Certicom AMI Solution A CERTICOM CUSTOMER USE CASE AUGUST 2010

Add to Reading List

Source URL: www.certicom.com

Language: English - Date: 2010-10-20 19:20:59
752Key management / Cryptography standards / Cryptography / FIPS 201 / Standards / Key size / Cryptographic hash function / Key / Cryptographic Module Validation Program / Digital Signature Algorithm / Public-key cryptography / Smart card

NIST Special Publication

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-06-10 13:59:58
753Cryptography / Security / Elliptic curve cryptography / Public-key cryptography / Building automation / Home automation / BlackBerry Limited / ZigBee / Ami / Smart grid / Computer security / ECC patents

Certicom AMI 7000 Series Security Appliances for Advanced Metering Infrastructure The Need for Security

Add to Reading List

Source URL: www.certicom.com

Language: English - Date: 2010-08-10 15:49:45
754Cryptography / Computational complexity theory / Distance-bounding protocol / Public-key cryptography / Complexity classes / Proof of knowledge / IP / Challengeresponse authentication / NP / Digital signature / Security parameter / Negligible function

Private and Secure Public-Key Distance Bounding Application to NFC Payment — Short Paper Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland http://lasec.epfl.ch

Add to Reading List

Source URL: fc15.ifca.ai

Language: English - Date: 2015-01-11 00:32:58
755Public-key cryptography / Computer security / DolevYao model / DiffieHellman key exchange / Cryptographic protocol / RSA / Exponentiation / DiffieHellman problem / Modular exponentiation

1 On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol M ARZIA B USCEMI, University of Pisa

Add to Reading List

Source URL: www.qatar.cmu.edu

Language: English - Date: 2004-12-05 23:21:27
756Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / E-commerce / Certificate authority / Public key certificate / Digital signature / Domain Name System Security Extensions / Self-signed certificate / Witness

arXiv:1503.08768v2 [cs.CR] 23 NovKeeping Authorities “Honest or Bust” with Decentralized Witness Cosigning Ewa Syta, Iulia Tamas, Dylan Visher, David Isaac Wolinsky

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-11-23 23:32:06
757Cryptography / Homeomorphisms / Homomorphic encryption / Public-key cryptography / Malleability / CramerShoup cryptosystem / Semantic security / RSA / Paillier cryptosystem / NaccacheStern cryptosystem

Targeted Malleability: Homomorphic Encryption for Restricted Computations Dan Boneh∗ Gil Segev†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-02 12:48:47
758Cryptography / Modular arithmetic / Cryptographic software / E-commerce / OpenSSL / RSA / Public-key cryptography / Modular exponentiation / Montgomery modular multiplication / Timing attack / Side-channel attack / Data Encryption Standard

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: tls.mbed.org

Language: English
759Transport Layer Security / Secure communication / Finite fields / Cryptographic protocols / Public-key cryptography / Logjam / DiffieHellman key exchange / Index calculus algorithm / XTR / Elliptic curve DiffieHellman / Key size / Safe prime

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Add to Reading List

Source URL: weakdh.org

Language: English - Date: 2015-10-15 14:53:20
760Cryptography / Public-key cryptography / Zero-knowledge proof / Oded Goldreich / Black box / Advantage / Salil Vadhan / Commitment scheme / Oded / Algorithm

Non-Black-Box Techniques in Cryptography Thesis for the Ph.D. Degree by Boaz Barak

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:53:13
UPDATE