language:
Find link is a tool written by Edward Betts.searching for Public-key cryptography 40 found (999 total)
alternate case: public-key cryptography
KeRanger
(705 words)
[view diff]
no match in snippet
view article
find links to article
user interface appearing. It encrypts the files with RSA and RSA public key cryptography, with the key for decryption only stored on the attacker's serversVictor Shoup (297 words) [view diff] exact match in snippet view article find links to article
considerable importance to public-key cryptography. He acted as editor for the ISO 18033-2 standard for public-key cryptography. One of the primary developersSemantic security (851 words) [view diff] no match in snippet view article find links to article
In cryptography, a semantically secure cryptosystem is one where only negligible information about the plaintext can be feasibly extracted from the ciphertextCrypto (book) (126 words) [view diff] no match in snippet view article
Steven Levy, published in 2001. Levy details the emergence of public key cryptography, digital signatures and the struggle between the National SecurityInstitute for Theoretical Computer Science (72 words) [view diff] case mismatch in snippet view article find links to article
academic events, including the tenth International Conference on Theory and Practice of Public-Key Cryptography (PKC) on April 16–20, 2007. ITCS homepageNaCl (software) (727 words) [view diff] no match in snippet view article
NaCl (Networking and Cryptography Library, pronounced "salt") is a public domain, high-speed software library for cryptography. NaCl was created by theHybrid cryptosystem (1,097 words) [view diff] no match in snippet view article find links to article
encrypt/decrypt a short key value. All practical implementations of public key cryptography today employ the use of a hybrid system. Examples include the TLSAuthenticator (3,661 words) [view diff] exact match in snippet view article find links to article
symmetric-key cryptography or public-key cryptography. Both avoid memorized secrets, and in the case of public-key cryptography, there are no shared secretsCode signing (2,642 words) [view diff] exact match in snippet view article find links to article
of the Eolas WebWish browser plug-in, which enabled the use of public-key cryptography to sign downloadable Web app program code using a secret key, soLynn Batten (428 words) [view diff] no match in snippet view article find links to article
Cambridge University Press. 9 April 2009. ISBN 978-0-521-11418-9. Public Key Cryptography. Hoboken, N.J: John Wiley & Sons. 22 January 2013. ISBN 978-1-118-31712-9Conjugate coding (282 words) [view diff] exact match in snippet view article find links to article
publication has been rejected, it was developed to the world of public-key cryptography in the 1980s as Oblivious Transfer, first by Michael Rabin andInteger factorization (2,983 words) [view diff] exact match in snippet view article find links to article
efficiently factors an arbitrary integer would render RSA-based public-key cryptography insecure. By the fundamental theorem of arithmetic, every positiveMartin Gardner (9,690 words) [view diff] exact match in snippet view article find links to article
paradox (Jul 1973) Tangrams (Aug 1974) Penrose tilings (Jan 1977) Public-key cryptography (Aug 1977) Hofstadter's Godel, Escher, Bach (Jul 1979) The MonsterBrent Waters (559 words) [view diff] no match in snippet view article find links to article
Secure Realization". Public Key Cryptography – PKC 2011. Lecture Notes in Computer Science. Vol. 6571. Public Key Cryptography – PKC 2011. pp. 53–70Generic-case complexity (2,706 words) [view diff] no match in snippet view article find links to article
cryptanalysis of Anshel–Anshel–Goldfeld key exchange protocol, in Public Key Cryptography PKC 2007, 76–88, Lecture Notes in Comput. Sci., 4450, SpringerMoti Yung (1,627 words) [view diff] exact match in snippet view article find links to article
particular, they described the first instances of ransomware using public-key cryptography. In 1996, Adam L. Young and Yung introduced the notion of kleptographyUnspent transaction output (1,270 words) [view diff] no match in snippet view article find links to article
characterizes those implementing the UTXO model. UTXOs employ public key cryptography to ascertain and transfer ownership. More specifically, the recipient'sVerifiable random function (1,501 words) [view diff] no match in snippet view article find links to article
International Workshop on Theory and Practice in Public Key Cryptography. International Workshop on Public Key Cryptography. Springer, Berlin, Heidelberg (publishedMULTOS (705 words) [view diff] no match in snippet view article find links to article
other types of smart card OS, is that it implements a patented public key cryptography-based mechanism by which the manufacture, issuance and dynamicIEEE Koji Kobayashi Computers and Communications Award (346 words) [view diff] case mismatch in snippet view article find links to article
Anja Feldmann "Kobayashi Award". www.merkle.com. "Inventors of Public-key Cryptography Receive IEEE Koji Kobayashi Computers and Communication Award"List of Jewish American computer scientists (1,638 words) [view diff] no match in snippet view article find links to article
for the ARPANET, the forerunner of the internet Martin Hellman, public key cryptography, co-inventor of the Diffie–Hellman key exchange protocol, TuringDorian M. Goldfeld (1,230 words) [view diff] exact match in snippet view article find links to article
Iris; Anshel, Michael; Goldfeld, Dorian An algebraic method for public-key cryptography. Math. Res. Lett. 6 (1999), no. 3–4, Anshel, Michael; GoldfeldIGC (file format) (364 words) [view diff] no match in snippet view article
Mobile ...). IGC files can optionally be digitally signed using public key cryptography, so that an IGC file can be verified as being created on a certainBobby Ray Inman (1,845 words) [view diff] no match in snippet view article find links to article
there was no prosecution. Hellman and Inman even became friends. Public key cryptography now forms an essential component of internet security. In 1980MIME Object Security Services (148 words) [view diff] no match in snippet view article find links to article
originator and a recipient at the application layer. Asymmetric (public key) cryptography is used in support of the digital signature service and encryptionYvo G. Desmedt (581 words) [view diff] no match in snippet view article find links to article
Committee of the International Workshop on Practice and Theory in Public Key Cryptography (PKC) He has been active in research for over 30 years mainly inCertCo (838 words) [view diff] no match in snippet view article find links to article
30 The Digital Signature Algorithm (DSA) ANSI X9.31 Reversible Public Key Cryptography (rDSA) (better known as RSA) ANSI X9.45 Attribute CertificatesPassword-based cryptography (210 words) [view diff] exact match in snippet view article find links to article
Password-authenticated key agreement Halevi, Shai; Krawczyk, Hugo (August 1999). "Public-key cryptography and password protocols". ACM Trans. Inf. Syst. Secur. 2 (3). AssociationPassword-based cryptography (210 words) [view diff] exact match in snippet view article find links to article
Password-authenticated key agreement Halevi, Shai; Krawczyk, Hugo (August 1999). "Public-key cryptography and password protocols". ACM Trans. Inf. Syst. Secur. 2 (3). AssociationIvan Damgård (352 words) [view diff] no match in snippet view article find links to article
2010, he was selected as IACR Fellow. In 2020, he received the Public Key Cryptography (PKC) conference Test of Time Award for the paper "A GeneralisationProvable prime (204 words) [view diff] case mismatch in snippet view article find links to article
174–178. ISBN 978-0387-25282-7. Mollin, Richard A. (2002), RSA and Public-Key Cryptography, Discrete Mathematics and Its Applications, CRC Press, pp. 124–125NTLM (3,408 words) [view diff] no match in snippet view article find links to article
belong to the same HomeGroup, a protocol similar to Kerberos, Public Key Cryptography based User to User Authentication will be used instead of NTLMEcash (917 words) [view diff] case mismatch in snippet view article find links to article
1996. ISBN 0-471-11709-9 (Chapter 6.4) Richard A. Mollin: RSA and Public-key Cryptography. p. 143-148. 2002, ISBN 1-58488-338-3, ISBN 978-1-58488-338-8.Judith Merkle Riley (206 words) [view diff] no match in snippet view article find links to article
Merkle, ran Project Pluto, and her brothers Ralph is a pioneer in public key cryptography. She earned a MA from Harvard University and held a Ph.D. fromJill Pipher (485 words) [view diff] no match in snippet view article find links to article
analysis and partial differential equations, groundbreaking work in public key cryptography, and outstanding scientific leadership". She was named to the 2021Unknown key-share attack (180 words) [view diff] no match in snippet view article find links to article
"Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol", Public Key Cryptography (PDF), Lecture Notes in Computer Science, vol. 1560, Springer,Promise problem (530 words) [view diff] exact match in snippet view article find links to article
(1984). "The complexity of promise problems with applications to public-key cryptography". Information and Control. 61 (2): 159–173. doi:10.1016/S0019-9958(84)80056-XYongge Wang (260 words) [view diff] case mismatch in snippet view article find links to article
original on May 5, 2002. Retrieved 22 August 2017. "Identity-Based Public-Key Cryptography". IEEE. Archived from the original on May 2, 2006. Retrieved 22Phil Zimmermann (1,478 words) [view diff] exact match in snippet view article find links to article
for download, the first widely available program implementing public-key cryptography. Shortly thereafter, it became available overseas via the InternetECRYPT (606 words) [view diff] no match in snippet view article find links to article
overview of every computational assumption that has been used in public key cryptography." The "Vampire lab" produced over 80 peer-reviewed and joined authored