Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Public-key cryptography 40 found (999 total)

alternate case: public-key cryptography

KeRanger (705 words) [view diff] no match in snippet view article find links to article

user interface appearing. It encrypts the files with RSA and RSA public key cryptography, with the key for decryption only stored on the attacker's servers
Victor Shoup (297 words) [view diff] exact match in snippet view article find links to article
considerable importance to public-key cryptography. He acted as editor for the ISO 18033-2 standard for public-key cryptography. One of the primary developers
Semantic security (851 words) [view diff] no match in snippet view article find links to article
In cryptography, a semantically secure cryptosystem is one where only negligible information about the plaintext can be feasibly extracted from the ciphertext
Crypto (book) (126 words) [view diff] no match in snippet view article
Steven Levy, published in 2001. Levy details the emergence of public key cryptography, digital signatures and the struggle between the National Security
Institute for Theoretical Computer Science (72 words) [view diff] case mismatch in snippet view article find links to article
academic events, including the tenth International Conference on Theory and Practice of Public-Key Cryptography (PKC) on April 16–20, 2007. ITCS homepage
NaCl (software) (727 words) [view diff] no match in snippet view article
NaCl (Networking and Cryptography Library, pronounced "salt") is a public domain, high-speed software library for cryptography. NaCl was created by the
Hybrid cryptosystem (1,097 words) [view diff] no match in snippet view article find links to article
encrypt/decrypt a short key value. All practical implementations of public key cryptography today employ the use of a hybrid system. Examples include the TLS
Authenticator (3,661 words) [view diff] exact match in snippet view article find links to article
symmetric-key cryptography or public-key cryptography. Both avoid memorized secrets, and in the case of public-key cryptography, there are no shared secrets
Code signing (2,642 words) [view diff] exact match in snippet view article find links to article
of the Eolas WebWish browser plug-in, which enabled the use of public-key cryptography to sign downloadable Web app program code using a secret key, so
Lynn Batten (428 words) [view diff] no match in snippet view article find links to article
Cambridge University Press. 9 April 2009. ISBN 978-0-521-11418-9. Public Key Cryptography. Hoboken, N.J: John Wiley & Sons. 22 January 2013. ISBN 978-1-118-31712-9
Conjugate coding (282 words) [view diff] exact match in snippet view article find links to article
publication has been rejected, it was developed to the world of public-key cryptography in the 1980s as Oblivious Transfer, first by Michael Rabin and
Integer factorization (2,983 words) [view diff] exact match in snippet view article find links to article
efficiently factors an arbitrary integer would render RSA-based public-key cryptography insecure. By the fundamental theorem of arithmetic, every positive
Martin Gardner (9,690 words) [view diff] exact match in snippet view article find links to article
paradox (Jul 1973) Tangrams (Aug 1974) Penrose tilings (Jan 1977) Public-key cryptography (Aug 1977) Hofstadter's Godel, Escher, Bach (Jul 1979) The Monster
Brent Waters (559 words) [view diff] no match in snippet view article find links to article
Secure Realization". Public Key Cryptography – PKC 2011. Lecture Notes in Computer Science. Vol. 6571. Public Key Cryptography – PKC 2011. pp. 53–70
Generic-case complexity (2,706 words) [view diff] no match in snippet view article find links to article
cryptanalysis of Anshel–Anshel–Goldfeld key exchange protocol, in Public Key Cryptography PKC 2007, 76–88, Lecture Notes in Comput. Sci., 4450, Springer
Moti Yung (1,627 words) [view diff] exact match in snippet view article find links to article
particular, they described the first instances of ransomware using public-key cryptography. In 1996, Adam L. Young and Yung introduced the notion of kleptography
Unspent transaction output (1,270 words) [view diff] no match in snippet view article find links to article
characterizes those implementing the UTXO model. UTXOs employ public key cryptography to ascertain and transfer ownership. More specifically, the recipient's
Verifiable random function (1,501 words) [view diff] no match in snippet view article find links to article
International Workshop on Theory and Practice in Public Key Cryptography. International Workshop on Public Key Cryptography. Springer, Berlin, Heidelberg (published
MULTOS (705 words) [view diff] no match in snippet view article find links to article
other types of smart card OS, is that it implements a patented public key cryptography-based mechanism by which the manufacture, issuance and dynamic
IEEE Koji Kobayashi Computers and Communications Award (346 words) [view diff] case mismatch in snippet view article find links to article
Anja Feldmann "Kobayashi Award". www.merkle.com. "Inventors of Public-key Cryptography Receive IEEE Koji Kobayashi Computers and Communication Award"
List of Jewish American computer scientists (1,638 words) [view diff] no match in snippet view article find links to article
for the ARPANET, the forerunner of the internet Martin Hellman, public key cryptography, co-inventor of the Diffie–Hellman key exchange protocol, Turing
Dorian M. Goldfeld (1,230 words) [view diff] exact match in snippet view article find links to article
Iris; Anshel, Michael; Goldfeld, Dorian An algebraic method for public-key cryptography. Math. Res. Lett. 6 (1999), no. 3–4, Anshel, Michael; Goldfeld
IGC (file format) (364 words) [view diff] no match in snippet view article
Mobile ...). IGC files can optionally be digitally signed using public key cryptography, so that an IGC file can be verified as being created on a certain
Bobby Ray Inman (1,845 words) [view diff] no match in snippet view article find links to article
there was no prosecution. Hellman and Inman even became friends. Public key cryptography now forms an essential component of internet security. In 1980
MIME Object Security Services (148 words) [view diff] no match in snippet view article find links to article
originator and a recipient at the application layer. Asymmetric (public key) cryptography is used in support of the digital signature service and encryption
Yvo G. Desmedt (581 words) [view diff] no match in snippet view article find links to article
Committee of the International Workshop on Practice and Theory in Public Key Cryptography (PKC) He has been active in research for over 30 years mainly in
CertCo (838 words) [view diff] no match in snippet view article find links to article
30 The Digital Signature Algorithm (DSA) ANSI X9.31 Reversible Public Key Cryptography (rDSA) (better known as RSA) ANSI X9.45 Attribute Certificates
Password-based cryptography (210 words) [view diff] exact match in snippet view article find links to article
Password-authenticated key agreement Halevi, Shai; Krawczyk, Hugo (August 1999). "Public-key cryptography and password protocols". ACM Trans. Inf. Syst. Secur. 2 (3). Association
Password-based cryptography (210 words) [view diff] exact match in snippet view article find links to article
Password-authenticated key agreement Halevi, Shai; Krawczyk, Hugo (August 1999). "Public-key cryptography and password protocols". ACM Trans. Inf. Syst. Secur. 2 (3). Association
Ivan Damgård (352 words) [view diff] no match in snippet view article find links to article
2010, he was selected as IACR Fellow. In 2020, he received the Public Key Cryptography (PKC) conference Test of Time Award for the paper "A Generalisation
Provable prime (204 words) [view diff] case mismatch in snippet view article find links to article
 174–178. ISBN 978-0387-25282-7. Mollin, Richard A. (2002), RSA and Public-Key Cryptography, Discrete Mathematics and Its Applications, CRC Press, pp. 124–125
NTLM (3,408 words) [view diff] no match in snippet view article find links to article
belong to the same HomeGroup, a protocol similar to Kerberos, Public Key Cryptography based User to User Authentication will be used instead of NTLM
Ecash (917 words) [view diff] case mismatch in snippet view article find links to article
1996. ISBN 0-471-11709-9 (Chapter 6.4) Richard A. Mollin: RSA and Public-key Cryptography. p. 143-148. 2002, ISBN 1-58488-338-3, ISBN 978-1-58488-338-8.
Judith Merkle Riley (206 words) [view diff] no match in snippet view article find links to article
Merkle, ran Project Pluto, and her brothers Ralph is a pioneer in public key cryptography. She earned a MA from Harvard University and held a Ph.D. from
Jill Pipher (485 words) [view diff] no match in snippet view article find links to article
analysis and partial differential equations, groundbreaking work in public key cryptography, and outstanding scientific leadership". She was named to the 2021
Unknown key-share attack (180 words) [view diff] no match in snippet view article find links to article
"Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol", Public Key Cryptography (PDF), Lecture Notes in Computer Science, vol. 1560, Springer,
Promise problem (530 words) [view diff] exact match in snippet view article find links to article
(1984). "The complexity of promise problems with applications to public-key cryptography". Information and Control. 61 (2): 159–173. doi:10.1016/S0019-9958(84)80056-X
Yongge Wang (260 words) [view diff] case mismatch in snippet view article find links to article
original on May 5, 2002. Retrieved 22 August 2017. "Identity-Based Public-Key Cryptography". IEEE. Archived from the original on May 2, 2006. Retrieved 22
Phil Zimmermann (1,478 words) [view diff] exact match in snippet view article find links to article
for download, the first widely available program implementing public-key cryptography. Shortly thereafter, it became available overseas via the Internet
ECRYPT (606 words) [view diff] no match in snippet view article find links to article
overview of every computational assumption that has been used in public key cryptography." The "Vampire lab" produced over 80 peer-reviewed and joined authored