Search

Your search keyword '"PUBLIC key cryptography"' showing total 63 results

Search Constraints

Start Over You searched for: Descriptor "PUBLIC key cryptography" Remove constraint Descriptor: "PUBLIC key cryptography" Publication Type Books Remove constraint Publication Type: Books
63 results on '"PUBLIC key cryptography"'

Search Results

1. Cryptanalytic Attacks and Countermeasures on RSA.

2. Concurrent-Secure Blind Signature Scheme Without Random Oracles.

3. Efficient and Flexible Co-processor for Server-Based Public Key Cryptography Applications.

4. Horizontal Correlation Analysis on Exponentiation.

5. Faster Montgomery Modular Multiplication without Pre-computational Phase For Some Classes of Finite Fields.

6. Signcryption with Non-interactive Non-repudiation without Random Oracles.

7. NTRU-Like Public Key Cryptosystems beyond Dedekind Domain up to Alternative Algebra.

8. Publishing Upper Half of RSA Decryption Exponent.

9. ID Based Cryptography and Anonymity in Delay/Disruption Tolerant Networks.

10. Simple Power Analysis on Exponentiation Revisited.

11. A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols.

12. Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes.

13. Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions.

14. Secure Multi-party Computation Minimizing Online Rounds.

15. Reducing Memory Requirements for Combinatorial Attacks on NTRU via Multiple Birthdays.

16. On the Security of an Efficient ID-based Partially Blind Signature Scheme.

17. Cryptanalysis of MOR and Discrete Logarithms in Inner Automorphism Groups.

18. Public-Key Locally-Decodable Codes.

19. Linear Bandwidth Naccache-Stern Encryption.

20. Cryptography Adapted to the New European Area of Higher Education.

21. Multi-Application Authentication based on Multi-Agent System.

22. Multi-Application Authentication based on Multi-Agent System.

23. An Analysis of Public Key Cryptography based Techniques in Wireless Sensor Networks.

24. Efficient and Secure Public-Key Cryptosystems.

25. Provable Security for Public Key Schemes.

26. Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000.

27. The Role of the Virus Scanner and Encryption.

28. How to Guard the Guards Themselves.

29. Protocols Guide: Network Security Technologies and Protocols: AAA Protocols: Kerberos: Network Authentication Protocol.

30. Root Certificate.

31. Public Key Cryptography.

32. DomainKeys.

33. PKINIT.

34. X.509.

35. Signed Document Markup Language.

36. RSA Cryptography Standard.

37. Public-Key Cryptography Standards.

38. Public Key Infrastructure.

39. Public Key Encryption.

40. PKCS #7.

41. Personal Information Exchange Syntax Standard.

42. Perfect Forward Secrecy or Public-Key Forward Secrecy.

43. Password-Based Crystography Standard.

44. Modification Detection Code.

45. Local Registration Authority.

46. Extended-Certificate Syntax Standard.

47. Encryption Certificate.

48. Elliptical Curve Cryptography.

49. Diffie-Hellman Key Exchange.

50. Data Key.

Catalog

Books, media, physical & digital resources