Digital signature/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Daniel Mietchen m (Robot: encapsulating subpages template in noinclude tag) |
imported>Housekeeping Bot m (Automated edit: Adding CZ:Workgroups to Category:Bot-created Related Articles subpages) |
||
Line 27: | Line 27: | ||
{{r|RSA}} | {{r|RSA}} | ||
{{Bot-created_related_article_subpage}} | |||
<!-- Remove the section above after copying links to the other sections. --> | <!-- Remove the section above after copying links to the other sections. --> |
Revision as of 14:58, 11 January 2010
- See also changes related to Digital signature, or pages that link to Digital signature or to this page or whose text contains "Digital signature".
Parent topics
Subtopics
Bot-suggested topics
Auto-populated based on Special:WhatLinksHere/Digital signature. Needs checking by a human.
- Asymmetric key cryptography [r]: A category of cryptographic techniques, which greatly simplify key management, which are based on mathematically related key pairs, such that the "public" key can be used to encrypt and be freely available, and only the holder of the "private" key can decrypt the message [e]
- Cryptographic key [r]: Value used by a computer together with a complex algorithm to encrypt and decrypt messages. [e]
- Cryptography controversy [r]: The "crypto wars", political controversies and legal cases involving the use of cryptography. [e]
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Digital certificate [r]: A means by which the user of a public key can obtain it from a central repository, with high confidence that key is correct and has not been revoked [e]
- Email [r]: A method of composing, sending, storing, and receiving messages over electronic communication systems. [e]
- Hash (cryptography) [r]: An algorithm that produces a fixed-size digest from an input of essentially arbitrary size. [e]
- History of cryptography [r]: The development, since antiquity, of means of concealing communications from other than the intended recipient [e]
- IPsec [r]: Internet Protocl security is a set of protocols for providing encryption and/or authentication services for Internet packets. [e]
- Man-in-the-middle attack [r]: An attack on a communications system in which the attacker deceives the communicating parties so they both talk to him while believing they are talking to each other. [e]
- Pretty Good Privacy [r]: E-mail encryption package created by Phillip Zimmerman. [e]
- RSA [r]: A widely used public key encryption algorithm whose strength depends on the difficulty of integer factorisation. [e]
Categories:
- Subpages
- Related Article Subpages
- Computers Related Article Subpages
- Mathematics Related Article Subpages
- Law Related Article Subpages
- All Content
- Computers Content
- Mathematics Content
- Law Content
- Security tag
- Bot-created Related Articles subpages
- Computers Bot-created Related Articles subpages
- Mathematics Bot-created Related Articles subpages
- Law Bot-created Related Articles subpages