- Public-key cryptography, or
asymmetric cryptography, is the
field of
cryptographic systems that use
pairs of
related keys. Each key pair
consists of a...
- e are generated,
which will
depend on the
precise means of RSA
random keypair generation in use. The most
efficient method known to
solve the RSA problem...
-
corresponds to
which real identity. To set up a nym, one
creates a PGP
keypair and
submits it to the nym server,
along with
instructions (called a reply...
-
specialized hardware wallets.: ch. 10 A
paper wallet is
created with a
keypair generated on a
computer with no
internet connection; the
private key is...
- public-key-based authentication,
usually supporting at
least DSA,
ECDSA or RSA
keypairs, with
other implementations also
supporting X.509 certificates. keyboard-interactive...
-
researchers found a
vulnerability (known as ROCA) in the
implementation of RSA
keypair generation in a
cryptographic library used by a
large number of Infineon...
- an open-source
implementation of
OpenPGP (RFC 4880) for emails.
OpenPGP keypair is
generated in client-browser,
encrypted (via AES256) with the user's...
- inter-operability and support,
Integrated account keystore,
Multiple PGP
keypair support,
Public keyserver connection, Full
reversibility and key revocation...
-
Information Syntax Standard See RFC 5958. Used to
carry private certificate keypairs (encrypted or unencrypted). PKCS #9 2.0
Selected Attribute Types See RFC...
- protocol. An
asymmetric signature keypair for each
party Required for authentication. The
public portion of this
keypair may be
shared prior to
session establishment...