Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for public-key cryptography 31 found (1005 total)

alternate case: Public-key cryptography

KeRanger (705 words) [view diff] no match in snippet view article find links to article

user interface appearing. It encrypts the files with RSA and RSA public key cryptography, with the key for decryption only stored on the attacker's servers
Victor Shoup (297 words) [view diff] exact match in snippet view article find links to article
considerable importance to public-key cryptography. He acted as editor for the ISO 18033-2 standard for public-key cryptography. One of the primary developers
Crypto (book) (126 words) [view diff] no match in snippet view article
Steven Levy, published in 2001. Levy details the emergence of public key cryptography, digital signatures and the struggle between the National Security
Institute for Theoretical Computer Science (72 words) [view diff] case mismatch in snippet view article find links to article
academic events, including the tenth International Conference on Theory and Practice of Public-Key Cryptography (PKC) on April 16–20, 2007. ITCS homepage
NaCl (software) (755 words) [view diff] no match in snippet view article
NaCl (Networking and Cryptography Library, pronounced "salt") is a public domain, high-speed software library for cryptography. NaCl was created by the
Semantic security (1,435 words) [view diff] no match in snippet view article find links to article
In cryptography, a semantically secure cryptosystem is one where only negligible information about the plaintext can be feasibly extracted from the ciphertext
Hybrid cryptosystem (1,129 words) [view diff] no match in snippet view article find links to article
encrypt/decrypt a short key value. All practical implementations of public key cryptography today employ the use of a hybrid system. Examples include the TLS
Authenticator (3,661 words) [view diff] exact match in snippet view article find links to article
symmetric-key cryptography or public-key cryptography. Both avoid memorized secrets, and in the case of public-key cryptography, there are no shared secrets
Code signing (2,661 words) [view diff] exact match in snippet view article find links to article
of the Eolas WebWish browser plug-in, which enabled the use of public-key cryptography to sign downloadable Web app program code using a secret key, so
Martin Gardner (9,665 words) [view diff] exact match in snippet view article find links to article
paradox (Jul 1973) Tangrams (Aug 1974) Penrose tilings (Jan 1977) Public-key cryptography (Aug 1977) Hofstadter's Godel, Escher, Bach (Jul 1979) The Monster
Integer factorization (2,977 words) [view diff] exact match in snippet view article find links to article
efficiently factors an arbitrary integer would render RSA-based public-key cryptography insecure. By the fundamental theorem of arithmetic, every positive
Conjugate coding (282 words) [view diff] exact match in snippet view article find links to article
publication has been rejected, it was developed to the world of public-key cryptography in the 1980s as Oblivious Transfer, first by Michael Rabin and
Lynn Batten (429 words) [view diff] no match in snippet view article find links to article
Cambridge University Press. 9 April 2009. ISBN 978-0-521-11418-9. Public Key Cryptography. Hoboken, N.J: John Wiley & Sons. 22 January 2013. ISBN 978-1-118-31712-9
Generic-case complexity (2,706 words) [view diff] no match in snippet view article find links to article
cryptanalysis of Anshel–Anshel–Goldfeld key exchange protocol, in Public Key Cryptography PKC 2007, 76–88, Lecture Notes in Comput. Sci., 4450, Springer
Moti Yung (1,630 words) [view diff] exact match in snippet view article find links to article
particular, they described the first instances of ransomware using public-key cryptography. In 1996, Adam L. Young and Yung introduced the notion of kleptography
Unspent transaction output (1,271 words) [view diff] no match in snippet view article find links to article
characterizes those implementing the UTXO model. UTXOs employ public key cryptography to ascertain and transfer ownership. More specifically, the recipient's
Verifiable random function (1,501 words) [view diff] no match in snippet view article find links to article
International Workshop on Theory and Practice in Public Key Cryptography. International Workshop on Public Key Cryptography. Springer, Berlin, Heidelberg (published
MULTOS (705 words) [view diff] no match in snippet view article find links to article
other types of smart card OS, is that it implements a patented public key cryptography-based mechanism by which the manufacture, issuance and dynamic
IEEE Koji Kobayashi Computers and Communications Award (346 words) [view diff] case mismatch in snippet view article find links to article
Anja Feldmann "Kobayashi Award". www.merkle.com. "Inventors of Public-key Cryptography Receive IEEE Koji Kobayashi Computers and Communication Award"
List of Jewish American computer scientists (1,638 words) [view diff] no match in snippet view article find links to article
for the ARPANET, the forerunner of the internet Martin Hellman, public key cryptography, co-inventor of the Diffie–Hellman key exchange protocol, Turing
Dorian M. Goldfeld (1,230 words) [view diff] exact match in snippet view article find links to article
Iris; Anshel, Michael; Goldfeld, Dorian An algebraic method for public-key cryptography. Math. Res. Lett. 6 (1999), no. 3–4, Anshel, Michael; Goldfeld
IGC (file format) (364 words) [view diff] no match in snippet view article
Mobile ...). IGC files can optionally be digitally signed using public key cryptography, so that an IGC file can be verified as being created on a certain
Bobby Ray Inman (2,205 words) [view diff] no match in snippet view article find links to article
there was no prosecution. Hellman and Inman even became friends. Public key cryptography now forms an essential component of internet security. In 1980
Yvo G. Desmedt (581 words) [view diff] no match in snippet view article find links to article
Committee of the International Workshop on Practice and Theory in Public Key Cryptography (PKC) He has been active in research for over 30 years mainly in
CertCo (848 words) [view diff] no match in snippet view article find links to article
30 The Digital Signature Algorithm (DSA) ANSI X9.31 Reversible Public Key Cryptography (rDSA) (better known as RSA) ANSI X9.45 Attribute Certificates
Password-based cryptography (210 words) [view diff] exact match in snippet view article find links to article
Password-authenticated key agreement Halevi, Shai; Krawczyk, Hugo (August 1999). "Public-key cryptography and password protocols". ACM Trans. Inf. Syst. Secur. 2 (3). Association
NTLM (3,408 words) [view diff] no match in snippet view article find links to article
belong to the same HomeGroup, a protocol similar to Kerberos, Public Key Cryptography based User to User Authentication will be used instead of NTLM
MIME Object Security Services (148 words) [view diff] no match in snippet view article find links to article
originator and a recipient at the application layer. Asymmetric (public key) cryptography is used in support of the digital signature service and encryption
Provable prime (204 words) [view diff] case mismatch in snippet view article find links to article
 174–178. ISBN 978-0387-25282-7. Mollin, Richard A. (2002), RSA and Public-Key Cryptography, Discrete Mathematics and Its Applications, CRC Press, pp. 124–125
Ecash (925 words) [view diff] case mismatch in snippet view article find links to article
1996. ISBN 0-471-11709-9 (Chapter 6.4) Richard A. Mollin: RSA and Public-key Cryptography. p. 143-148. 2002, ISBN 1-58488-338-3, ISBN 978-1-58488-338-8.
Ivan Damgård (413 words) [view diff] no match in snippet view article find links to article
2010, he was selected as IACR Fellow. In 2020, he received the Public Key Cryptography (PKC) conference Test of Time Award for the paper "A Generalisation