Knowledge

Category:Public-key cryptography

Source đź“ť

533: 68: 88: 460: 438: 650: 655: 594: 443: 176: 136: 216: 782: 687: 349: 250: 233: 51: 516: 376: 418: 156: 719: 611: 371: 366: 271: 692: 538: 465: 428: 339: 746: 433: 300: 112: 675: 528: 305: 741: 391: 599: 501: 283: 22: 736: 670: 665: 511: 322: 295: 818: 344: 776: 543: 354: 751: 660: 731: 413: 386: 360: 633: 396: 582: 401: 196: 616: 489: 477: 327: 317: 17: 697: 560: 381: 812: 555: 714: 577: 254: 237: 220: 200: 92: 55: 702: 180: 160: 116: 140: 72: 763: 423: 35:
This category has the following 11 subcategories, out of 11 total.
794: 628: 572: 506: 455: 799: 645: 270:
The following 74 pages are in this category, out of 74 total.
534:Identity-based conditional proxy re-encryption 8: 267:Pages in category "Public-key cryptography" 461:Elliptic Curve Digital Signature Algorithm 439:DNS-based Authentication of Named Entities 272:This list may not reflect recent changes 595:The Magic Words are Squeamish Ossifrage 444:Domain Name System Security Extensions 651:Pointcheval–Stern signature algorithm 7: 656:Post-Quantum Extended Diffie–Hellman 69:Attacks on public-key cryptosystems 783:Wireless Public Key Infrastructure 688:Resource Public Key Infrastructure 350:Offline root certificate authority 276: 247: 230: 133: 109: 89:Computational hardness assumptions 65: 48: 37: 29: 14: 517:Hyperelliptic curve cryptography 377:Certification Practice Statement 1: 720:Smart card management system 612:Non-commutative cryptography 372:Certificateless cryptography 367:Certificate-based encryption 693:Certificate revocation list 539:Identity-based cryptography 466:Elliptic-curve cryptography 429:Digital Signature Algorithm 419:Diffie–Hellman key exchange 340:Card Verifiable Certificate 177:Identity-based cryptography 137:Elliptic curve cryptography 835: 747:Transient-key cryptography 434:Distributed key generation 301:Attribute-based encryption 217:Pairing-based cryptography 16:The main article for this 15: 676:Public key infrastructure 529:Identity-based encryption 392:Cohen's cryptosystem 306:Authorization certificate 251:Public key infrastructure 234:Post-quantum cryptography 52:Asymmetric-key algorithms 742:Torus-based cryptography 600:Merkle signature scheme 502:Hash-based cryptography 284:Public-key cryptography 23:Public-key cryptography 737:Threshold cryptosystem 671:Public key fingerprint 666:Public key certificate 512:Homomorphic encryption 323:BLISS signature scheme 296:Anonymous veto network 157:Homomorphic encryption 345:Certificate authority 777:Wildcard certificate 544:Implicit certificate 355:Validation authority 752:Trusted third party 661:Proxy re-encryption 732:Teleadministration 414:Detached signature 387:Client certificate 361:Certificate server 634:Open vote network 397:Commitment scheme 113:Digital signature 826: 779: 583:Key Transparency 402:Crypto-shredding 363: 256: 249: 239: 232: 222: 202: 182: 162: 142: 135: 118: 111: 94: 74: 67: 57: 50: 834: 833: 829: 828: 827: 825: 824: 823: 809: 808: 807: 806: 805: 804: 787: 775: 768: 756: 724: 707: 680: 638: 621: 617:Non-repudiation 604: 587: 565: 548: 521: 494: 490:Group signature 482: 478:Forward secrecy 470: 448: 406: 359: 332: 328:Byzantine fault 318:Blind signature 310: 288: 264: 263: 262: 261: 258: 257: 246: 241: 240: 229: 224: 223: 207: 204: 203: 187: 184: 183: 167: 164: 163: 147: 144: 143: 132: 123: 120: 119: 108: 99: 96: 95: 79: 76: 75: 64: 59: 58: 47: 28: 27: 12: 11: 5: 832: 830: 822: 821: 811: 810: 803: 802: 797: 791: 788: 786: 785: 780: 772: 769: 767: 766: 760: 757: 755: 754: 749: 744: 739: 734: 728: 725: 723: 722: 717: 711: 708: 706: 705: 700: 698:Ring signature 695: 690: 684: 681: 679: 678: 673: 668: 663: 658: 653: 648: 642: 639: 637: 636: 631: 625: 622: 620: 619: 614: 608: 605: 603: 602: 597: 591: 588: 586: 585: 580: 575: 569: 566: 564: 563: 561:Jeevan Pramaan 558: 552: 549: 547: 546: 541: 536: 531: 525: 522: 520: 519: 514: 509: 504: 498: 495: 493: 492: 486: 483: 481: 480: 474: 471: 469: 468: 463: 458: 452: 449: 447: 446: 441: 436: 431: 426: 421: 416: 410: 407: 405: 404: 399: 394: 389: 384: 382:Chain of trust 379: 374: 369: 364: 357: 352: 347: 342: 336: 333: 331: 330: 325: 320: 314: 311: 309: 308: 303: 298: 292: 289: 287: 286: 280: 278: 277: 268: 265: 260: 259: 245: 244: 242: 228: 227: 225: 215: 214: 211: 208: 206: 205: 195: 194: 191: 188: 186: 185: 175: 174: 171: 168: 166: 165: 155: 154: 151: 148: 146: 145: 131: 130: 127: 124: 122: 121: 107: 106: 103: 100: 98: 97: 87: 86: 83: 80: 78: 77: 63: 62: 60: 46: 45: 42: 39: 38: 33: 30: 13: 10: 9: 6: 4: 3: 2: 831: 820: 817: 816: 814: 801: 798: 796: 793: 792: 789: 784: 781: 778: 774: 773: 770: 765: 762: 761: 758: 753: 750: 748: 745: 743: 740: 738: 735: 733: 730: 729: 726: 721: 718: 716: 713: 712: 709: 704: 701: 699: 696: 694: 691: 689: 686: 685: 682: 677: 674: 672: 669: 667: 664: 662: 659: 657: 654: 652: 649: 647: 644: 643: 640: 635: 632: 630: 627: 626: 623: 618: 615: 613: 610: 609: 606: 601: 598: 596: 593: 592: 589: 584: 581: 579: 576: 574: 571: 570: 567: 562: 559: 557: 556:Java KeyStore 554: 553: 550: 545: 542: 540: 537: 535: 532: 530: 527: 526: 523: 518: 515: 513: 510: 508: 505: 503: 500: 499: 496: 491: 488: 487: 484: 479: 476: 475: 472: 467: 464: 462: 459: 457: 454: 453: 450: 445: 442: 440: 437: 435: 432: 430: 427: 425: 422: 420: 417: 415: 412: 411: 408: 403: 400: 398: 395: 393: 390: 388: 385: 383: 380: 378: 375: 373: 370: 368: 365: 362: 358: 356: 353: 351: 348: 346: 343: 341: 338: 337: 334: 329: 326: 324: 321: 319: 316: 315: 312: 307: 304: 302: 299: 297: 294: 293: 290: 285: 282: 281: 279: 275: 273: 266: 252: 248: 243: 235: 231: 226: 218: 213: 212: 209: 198: 193: 192: 189: 178: 173: 172: 169: 158: 153: 152: 149: 138: 134: 129: 128: 125: 114: 110: 105: 104: 101: 90: 85: 84: 81: 70: 66: 61: 53: 49: 44: 43: 40: 36: 32:Subcategories 31: 25: 24: 19: 819:Cryptography 715:Signcryption 578:Key exchange 269: 34: 21: 703:RSA problem 255:(2 C, 30 P) 238:(4 C, 26 P) 141:(1 C, 34 P) 56:(3 C, 14 P) 117:(2 C, 4 P) 73:(1 C, 4 P) 813:Category 18:category 764:U-Prove 424:DigiDoc 197:OpenPGP 221:(11 P) 201:(22 P) 93:(25 P) 795:X.509 629:OneID 573:KCDSA 507:HEAAN 456:EdDSA 181:(8 P) 161:(6 P) 800:XUDA 646:PKCS 20:is 815:: 274:. 253:‎ 236:‎ 219:‎ 199:‎ 179:‎ 159:‎ 139:‎ 115:‎ 91:‎ 71:‎ 54:‎ 790:X 771:W 759:U 727:T 710:S 683:R 641:P 624:O 607:N 590:M 568:K 551:J 524:I 497:H 485:G 473:F 451:E 409:D 335:C 313:B 291:A 210:P 190:O 170:I 150:H 126:E 102:D 82:C 41:A 26:.

Index

category
Public-key cryptography

Asymmetric-key algorithms

Attacks on public-key cryptosystems
Computational hardness assumptions

Digital signature

Elliptic curve cryptography
Homomorphic encryption
Identity-based cryptography
OpenPGP
Pairing-based cryptography

Post-quantum cryptography

Public key infrastructure
This list may not reflect recent changes
Public-key cryptography
Anonymous veto network
Attribute-based encryption
Authorization certificate
Blind signature
BLISS signature scheme
Byzantine fault
Card Verifiable Certificate
Certificate authority
Offline root certificate authority

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑