Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

PKCS 11

Known as: Cryptoki, PKCS ♯11, PKCS11 
In cryptography, PKCS #11 is one of the Public-Key Cryptography Standards, and also refers to the programming interface to create and manipulate… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Information security has been a growing concern over the past few years. During the last few decades, the importance of security… Expand
2011
2011
Cryptographic algorithms are widely used inside software for data security and integrity. The search of cryptographic data… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • table 1
2010
2010
The definition and functions of typical crypto security architectures are illustrated systematically.The features of typical… Expand
2009
2009
Security API analysis typically only considers a subset of an API's functions, with results bounded by the number of function… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2009
2009
PKCS11 is a set of cryptography device standards that is most broadly applied in the system of PKI. The conception of session in… Expand
2007
2007
Summary Various security APIs such as IETF GCS-API and GSS-API, RSA Cryptoki, Microsoft CryptoAPI, and Intel CDSA are being used… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • figure 2
Highly Cited
2003
Highly Cited
2003
Public Key Cryptography Standards (PKCS) #11 has gained wide acceptance within the cryptographic security device community and… Expand
2001
2001
Abstract : This final report for this project focuses on: Design and implementation of the Secure Group message ordering and… Expand
Review
1997
Review
1997
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other… Expand
Review
1995
Review
1995
Until recently, the integration of cryptographic functionality into application software has required that developers tightly… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3