<--- Back to Details
First PageDocument Content
Notary / Cryptographic protocols / Kerberos / Digital signature / Public key infrastructure / Key / Government Communications Headquarters / Shared secret / Cipher / Cryptography / Key management / Public-key cryptography
Date: 2010-08-20 09:24:43
Notary
Cryptographic protocols
Kerberos
Digital signature
Public key infrastructure
Key
Government Communications Headquarters
Shared secret
Cipher
Cryptography
Key management
Public-key cryptography

The GCHQ Protocol and its Problems Ross Anderson, Michael Roe Cambridge University Computer Laboratory Pembroke Street, Cambridge CB2 3QG Email: (rja14,mrr)@cl.cam.ac.uk

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Download Document from Source Website

File Size: 149,68 KB

Share Document on Facebook

Similar Documents

Notary Commission Application

Notary Commission Application

DocID: 1xVSN - View Document

Notary commission guide 2017.indd

Notary commission guide 2017.indd

DocID: 1xTQd - View Document

Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services Georg Merzdovnik1 , Klaus Falb2 , Martin Schmiedecker1 , Artemios G. Voyiatzis1,2 , and Edgar Weippl1,2 1

Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services Georg Merzdovnik1 , Klaus Falb2 , Martin Schmiedecker1 , Artemios G. Voyiatzis1,2 , and Edgar Weippl1,2 1

DocID: 1vgMu - View Document

Four-Year Notary Public Commission Application

Four-Year Notary Public Commission Application

DocID: 1veLC - View Document

Open-Transactions: Secure Contracts between Untrusted Parties Chris Odom  Abstract A low-trust notary could replace conventional transaction servers and would allow users to gain access to safe,

Open-Transactions: Secure Contracts between Untrusted Parties Chris Odom Abstract A low-trust notary could replace conventional transaction servers and would allow users to gain access to safe,

DocID: 1v1O0 - View Document