Fumy, 1999 - Google Patents
Key management techniquesFumy, 1999
View PDF- Document ID
- 15529302046471505474
- Author
- Fumy W
- Publication year
- Publication venue
- State of the Art in Applied Cryptography: Course on Computer Security and Industrial Cryptography Leuven, Belgium, June 3–6, 1997 Revised Lectures
External Links
Snippet
Security services based on cryptographic mechanisms assume cryptographic keys to be available to the communicating parties prior to secure communications. Key management techniques depend on the underlying cryptographic techniques, the intended use of the …
- 238000000034 method 0 title abstract description 71
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Merkle | Protocols for public key cryptosystems | |
Perlman | The ephemerizer: Making data disappear | |
US6058188A (en) | Method and apparatus for interoperable validation of key recovery information in a cryptographic system | |
US5907618A (en) | Method and apparatus for verifiably providing key recovery information in a cryptographic system | |
CA2187035C (en) | Computer network cryptographic key distribution system | |
US5796833A (en) | Public key sterilization | |
JP4384728B2 (en) | Key agreement and transport protocols using intrinsic signatures | |
JP3560439B2 (en) | Device for performing encryption key recovery | |
Carlsen | Optimal privacy and authentication on a portable communications system | |
US8687812B2 (en) | Method and apparatus for public key cryptography | |
US20030012386A1 (en) | Forward-secure commercial key escrow systems and escrowing methods thereof | |
US20030210789A1 (en) | Data transmission links | |
JP2005515701A6 (en) | Data transmission link | |
JP2005515715A (en) | Data transmission link | |
US7971234B1 (en) | Method and apparatus for offline cryptographic key establishment | |
CN118555133A (en) | Quantum-resistant security enhancement method of transport layer security protocol | |
Prabhu et al. | Security in computer networks and distributed systems | |
Fumy | Key management techniques | |
Yeun | Design, analysis and applications of cryptographic techniques | |
CN117749413B (en) | Secure communication method and secure communication system based on TLCP (transport layer control protocol) business-to-business protocol | |
Witzke et al. | Key management for large scale end-to-end encryption | |
US20240214187A1 (en) | System and Method of Creating Symmetric Keys Using Elliptic Curve Cryptography | |
CN118540164B (en) | Quantum security enhancement method for Internet key exchange protocol | |
Yeun et al. | Secure software download for programmable mobile user equipment | |
Merkle | 4. Protocols for |