Search results
Jump to navigation
Jump to search
- #REDIRECT [[Identity-based cryptography]] ...41 bytes (3 words) - 21:39, 7 October 2020
- #REDIRECT [[Identity-based cryptography]] ...41 bytes (3 words) - 21:38, 7 October 2020
- ...o|last3=Kim|first4=Jeongmo|last4=Yang|title=Secure Key Issuing in ID-based Cryptography|url=https://www.researchgate.net/publication/2924148|journal=Second Austral ...ull private key. After that, the system becomes the same as identity-based cryptography. ...2 KB (330 words) - 16:09, 29 November 2024
- {{Short description|Variant of ID-based cryptography}} '''Certificateless cryptography''' is a variant of [[ID-based cryptography]] intended to prevent the [[key escrow]] problem. Ordinarily, keys are gene ...4 KB (623 words) - 17:20, 16 February 2025
- ...yption''' is a system in which a [[certificate authority]] uses [[ID-based cryptography]] to produce a [[Public key certificate|certificate]]. This system gives th ...user's private key (i.e., there is no implicit [[escrow]] as with ID-based cryptography, as the double encryption means they cannot decrypt it solely with the info ...2 KB (355 words) - 18:27, 28 November 2024
- {{short description|IEEE standardization project for public-key cryptography}} ...nd Electronics Engineers]] (IEEE) standardization project for [[public-key cryptography]]. It includes specifications for: ...6 KB (678 words) - 03:54, 31 July 2024
- ...m '''ciphertext expansion'''<ref>{{Cite book |last=Jain |first=V.K. |title=Cryptography and Network Security |publisher=Khanna Book Publishing Co. |isbn=9789380016 ...e-the-problem-of-fhe-ciphertext-expansion |access-date=2024-07-17 |website=Cryptography Stack Exchange |language=en}}</ref> ...3 KB (420 words) - 00:33, 21 October 2024
- In [[cryptography]], a '''zero-knowledge password proof''' (ZKPP) is a type of [[zero-knowled * [[Outline of cryptography]] ...3 KB (384 words) - 19:11, 3 June 2025
- ==Telecommunications, computing, cryptography== ...2 KB (239 words) - 09:49, 23 May 2025
- ...he [[certificate (cryptography)|certificate]] containing that [[public key cryptography|public key]] and the person's name, etc.<ref>The Keysigning Party HOWTO htt ...using fingerprint as key based on phase retrieval algorithm and public key cryptography|url=https://www.sciencedirect.com/science/article/pii/S014381661500072X|jou ...3 KB (450 words) - 20:38, 23 May 2025
- {{Short description|Computational hardness assumption used in elliptic curve cryptography}} ...certain [[subgroup]]s of elliptic curves which have useful properties for cryptography. Specifically, XDH implies the existence of two distinct [[Group (mathemat ...5 KB (622 words) - 02:40, 18 June 2024
- ...e are various algorithms for both symmetric keys and asymmetric public key cryptography to solve this problem. For key authentication using the traditional [[symmetric key]] cryptography, this is the problem of assuring that there is no [[man-in-the-middle attac ...4 KB (650 words) - 20:34, 18 October 2024
- ...e–response]] based mechanism that uses [[Symmetric-key algorithm|symmetric cryptography]]. ...etworks. AKA is a challenge–response based mechanism that uses [[symmetric cryptography]]. AKA is typically run in a UMTS [[IP Multimedia Services Identity Module] ...3 KB (439 words) - 03:34, 17 April 2022
- ==Pairings in cryptography== {{Main|Pairing-based cryptography}} ...6 KB (962 words) - 19:35, 13 March 2025
- ...parties authenticate one another by signing and passing back and forth a [[cryptography|cryptographically]] signed [[cryptographic nonce|nonce]], each party demons * [[Cryptography]] ...4 KB (547 words) - 02:33, 24 June 2025
- == Cryptography == * [[Key signature (cryptography)]], the result of applying a hash function on a key ...4 KB (576 words) - 07:10, 25 June 2025
- ...f his messages that is to be sent to Charlie. This generates a new [[Key (cryptography)|key]] that Charlie can use to decrypt the message. Now if Bob sends Charl ...milar to traditional [[Symmetric-key algorithm|symmetric]] or [[Public-key cryptography|asymmetric encryption]] schemes, with the addition of two functions: ...6 KB (940 words) - 03:10, 24 January 2025
- In [[cryptography]], '''message forgery''' is sending a message so to deceive the recipient a ...1 KB (187 words) - 23:18, 13 April 2025
- ...cation in IP addressing by implementing a host identity namespace based on cryptography. This version introduces new features that allow devices to connect more se ...6 KB (769 words) - 15:29, 3 November 2024
- In [[cryptography]], '''MAGENTA''' is a [[symmetric key algorithm|symmetric key]] [[block cip MAGENTA has a [[block size (cryptography)|block size]] of 128 [[bit]]s and [[key size]]s of 128, 192 and 256 bits. I ...3 KB (380 words) - 14:55, 20 June 2025