# Category:Public-key cryptography

Computing portal |

Here is a list of articles in the Public-key cryptography category of the Computing portal that unifies foundations of mathematics and computations using computers.

## Subcategories

This category has the following 7 subcategories, out of 7 total.

### A

### E

### H

### I

### P

## Pages in category "Public-key cryptography"

The following 74 pages are in this category, out of 74 total.

- Public-key cryptography
*(computing)*

### A

- Anonymous veto network
*(computing)* - Attribute-based encryption
*(computing)* - Authorization certificate
*(computing)*

### B

- Blind signature
*(computing)* - BLISS signature scheme
*(computing)* - Byzantine fault
*(computing)* - Byzantine fault tolerance
*(computing)*

### C

- Card Verifiable Certificate
*(computing)* - Certificate authority
*(computing)* - Offline root certificate authority
*(computing)* - Validation authority
*(computing)* - Certificate server
*(computing)* - Certificate-based encryption
*(computing)* - Certificate-less authenticated encryption
*(computing)* - Certificateless cryptography
*(computing)* - Certification Practice Statement
*(computing)* - Chain of trust
*(computing)* - CLAE
*(computing)* - Client certificate
*(computing)* - Cohen's cryptosystem
*(computing)* - Commitment scheme
*(computing)* - Crypto-shredding
*(computing)* - Cyber Secure Asia
*(company)*

### D

- Detached signature
*(computing)* - Diffie–Hellman key exchange
*(computing)* - DigiDoc
*(computing)* - Distributed key generation
*(computing)* - DNS-based Authentication of Named Entities
*(computing)* - Domain Name System Security Extensions
*(computing)*

### E

- Elliptic-curve cryptography
*(computing)*

### F

- Forward secrecy
*(computing)*

### G

- Group signature
*(computing)*

### H

- Hash-based cryptography
*(computing)* - HEAAN
*(computing)* - Homomorphic encryption
*(computing)* - Hyperelliptic curve cryptography
*(computing)*

### I

- ID-based cryptography
*(computing)* - ID-based encryption
*(computing)* - Identity-based conditional proxy re-encryption
*(computing)* - Implicit certificate
*(computing)*

### J

- Java KeyStore
*(computing)* - Jeevan Pramaan
*(computing)*

### K

- KCDSA
*(computing)* - Key exchange
*(computing)* - Keystore
*(computing)*

### M

- Merkle signature scheme
*(computing)* - Multisignature
*(computing)*

### N

- Non-commutative cryptography
*(computing)* - Non-repudiation
*(computing)*

### O

- Open vote network
*(computing)*

### P

- PKCS
*(computing)* - Pointcheval–Stern signature algorithm
*(computing)* - Proxy re-encryption
*(computing)* - Public key certificate
*(computing)* - Public key fingerprint
*(computing)* - Public key infrastructure
*(computing)*

### R

- Resource Public Key Infrastructure
*(computing)* - Certificate revocation list
*(computing)* - Ring signature
*(computing)*

### S

- SAFE-BioPharma Association
*(organization)* - Signcryption
*(computing)* - Smart card management system
*(computing)* - Subject Alternative Name
*(computing)*

### T

- Teleadministration
*(computing)* - Threshold cryptosystem
*(computing)* - Torus-based cryptography
*(computing)* - Transient-key cryptography
*(computing)* - Trusted third party
*(computing)*

### U

- U-Prove
*(software)*

### W

- Wildcard certificate
*(computing)* - Wireless Public Key Infrastructure
*(computing)*