Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

PKCS 11

Known as: Cryptoki, PKCS ♯11, PKCS11 
In cryptography, PKCS #11 is one of the Public-Key Cryptography Standards, and also refers to the programming interface to create and manipulate… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
The Domain Name System (DNS) has evolved to support the exponential growth of the Internet, by relying heavily on a highly… Expand
Is this relevant?
2012
2012
Purpose: Histone deacetylase inhibitors (HDACi) are actively explored as new-generation epigenetic drugs but have low efficacy in… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2012
2012
Akt phosphorylation has previously been described to be involved in mediating DNA damage repair through the nonhomologous end… Expand
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2011
2011
Cryptographic algorithms are widely used inside software for data security and integrity. The search of cryptographic data… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • table 1
Is this relevant?
2010
2010
The definition and functions of typical crypto security architectures are illustrated systematically.The features of typical… Expand
Is this relevant?
2009
2009
PKCS11 is a set of cryptography device standards that is most broadly applied in the system of PKI. The conception of session in… Expand
Is this relevant?
2007
2007
Summary Various security APIs such as IETF GCS-API and GSS-API, RSA Cryptoki, Microsoft CryptoAPI, and Intel CDSA are being used… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Public Key Cryptography Standards (PKCS) #11 has gained wide acceptance within the cryptographic security device community and… Expand
Is this relevant?
2001
2001
Abstract : This final report for this project focuses on: Design and implementation of the Secure Group message ordering and… Expand
Is this relevant?
1999
1999
In this work we use Tropyc, a pattern language for cryptographic software , to evaluate a group of six Cryptographic Application… Expand
Is this relevant?