Semantic Scholar uses AI to extract papers important to this topic.
The National Institute of Standards and Technology is in the process of selecting one or more public-key cryptographic algorithms… Expand Access to computer systems and the information held on them, be it commercially or personally sensitive, is naturally, strictly… Expand A new information hiding scheme for color images based on the concept of visual cryptography and the Boolean exclusive-or (XOR… Expand Cryptographic standards serve two important goals: making different implementations interoperable and avoiding various known… Expand We present the performance measures of our Java Cryptography Architecture (JCA) implementation that integrates sanitizable… Expand This document represents a republication of PKCS #8 v1.2 from RSA
Laboratories' Public Key Cryptography Standard (PKCS) series… Expand This document supplements RFC 3279. It describes the conventions for
using the RSA Probabilistic Signature Scheme (RSASSA-PSS… Expand This memo represents a republication of PKCS #1 v2.1 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and… Expand Telemedicine services involve transmission of patient data over open computer network, and thus confront serious security… Expand This memo represents a republication of PKCS #5 v2.0 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and… Expand