language:
Find link is a tool written by Edward Betts.searching for Key signature (cryptography) 12 found (16 total)
alternate case: key signature (cryptography)
Digital Signature Algorithm
(2,221 words)
[view diff]
no match in snippet
view article
find links to article
message). In 1982, the U.S government solicited proposals for a public key signature standard. In August 1991 the National Institute of Standards and TechnologyCollision resistance (661 words) [view diff] no match in snippet view article find links to article
In cryptography, collision resistance is a property of cryptographic hash functions: a hash function H is collision-resistant if it is hard to find twoServer-based signatures (1,187 words) [view diff] no match in snippet view article find links to article
In cryptography, server-based signatures are digital signatures in which a publicly available server participates in the signature creation process. ThisPost-quantum cryptography (6,408 words) [view diff] no match in snippet view article find links to article
Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithmsWebAuthn (3,086 words) [view diff] no match in snippet view article find links to article
password-based authentication. Zero-knowledge proofs based on public-key signature schemes are used to register and authenticate users without the needMultivariate cryptography (1,147 words) [view diff] no match in snippet view article find links to article
Multivariate cryptography is the generic term for asymmetric cryptographic primitives based on multivariate polynomials over a finite field F {\displaystyleClaw-free permutation (586 words) [view diff] no match in snippet view article find links to article
In the mathematical and computer science field of cryptography, a group of three numbers (x,y,z) is said to be a claw of two permutations f0 and f1 ifForward anonymity (697 words) [view diff] no match in snippet view article find links to article
Forward anonymity is a property of a cryptographic system which prevents an attacker who has recorded past encrypted communications from discovering itsRabin signature algorithm (2,011 words) [view diff] no match in snippet view article find links to article
A. (October 1996). "§11.3.4: The Rabin public-key signature scheme". Handbook of Applied Cryptography (PDF). CRC Press. pp. 438–442. ISBN 0-8493-8523-7Transport Layer Security (17,517 words) [view diff] no match in snippet view article find links to article
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network, such as the Internet.Linked timestamping (1,715 words) [view diff] no match in snippet view article find links to article
Linked timestamping is inherently more secure than the usual, public-key signature based time-stamping. All consequential time-stamps "seal" previouslyMusic cipher (3,733 words) [view diff] no match in snippet view article find links to article
In cryptography, a music cipher is an algorithm for the encryption of a plaintext into musical symbols or sounds. Music-based ciphers are related to, but