Some Examples of the PKCS Standards.
676ff34349b646c48a24c3923f34b3737b0927aeefb31dd31940749d094bcc21
A Layman's Guide to a Subset of ASN1, BER, and DER.
011be717822753b63474c613bc2f461e8f5973c1c6e5cd45db993dc338331960
An Overview of the PKCS Standards.
122d86a835e3e7cf4292a749552545e6fa85fc74f5328af98e996548cddb13ae
RSA Encryption Standard.
dbe506cec41f593395b029d9939fdc4ca786b68cb1ec63edf7c694c856b98c79
Certifcation Request Syntax Standard
a9a839714e1e5e55b01bd54fffc8c1fd61ab3af9482f0bbeacd321a69940b462
Diffie-Hellman Key-Agreement Standard.
5ce50cbd5ee511da5ea9062ba2d5aceec3ae57629c3db8b13268e8998d8a707d
Password-Based Encryption Standard.
b0edd00c16073e598ef69746bf3fea134a306f6ca1248268bebda68ef76af2e3
Extended-Certificate Syntax Standard
f07580a404b09591e31abb63f4336db5a256a916590aa109c00bb0c5a4fc3031
Cryptographic Message Syntax Standard
6b81154cec3cdeced2eaec7c13f9e59f18a96f8b575988b430da0a159e2ea2f1
Private-Key Information Syntax Standard
1d01be37b08823beb0ea019ee147a56090736098b92916e76058c74470e4e67c
Selected Attribute Types
c1bb3bc9fe6d6784c96c49a622f48d83e9c927edee767c518e951bb01b519b1c
Network Security via Private-Key Certificates: Some practical security protocols that use private-key encryption in the public-key style
3f459829ae5cc19ba32e6deaf65e3a866b37601e1a6c4b3d838bf6d799996e4e
Answers to Frequently Asked Questions About Today's Cryptography
a04000be5efcb1eac57357e1885c3e0caba4ef09dd25865f77e1c1e2d353f06d
Cryptography FAQ
80baed10f218e99a7e972315153f01c533a60a1f18efd9ce7d6eed9645d01eaa
SKIPJACK Review: Interim Report: The SKIPJACK Algorithm: The report from the group of non-government cryptologists who reviewed the classified SKIPJACK encryption algorithm used in the Clinton administration's Clipper and Capstone chips
f81e24537588e219f6b5a4e8a5562e642e9a4dffe32b9dd3d8f5cbf3756e4cbb
The Architecture and Implementation of Network Layer Security Under Unix: A description of a network-layer security protocol for the IP protocol suite that provides authentication, integrity, and confidentiality of IP datagrams.
cfd236214d3367ca89ed8907bc120a9da3fcb29b7f329e9abad2e43087f6857a
Visa Protocols for Controlling Inter-Organizational Datagram Flow: A cryptographic method for authenticating and authorizing a flow of datagrams.
f3953c84c07a31edd88b747589d90e3c04a2cbe2c8f4e6a5b2bc6d888b360333
Visa Protocols for Controlling Inter-Organizational Datagram Flow: Extended Description A cryptographic method for authenticating and authorizing a flow of datagrams.
4d768a161b3ac1204bc12f8e31eb9603959f575a6294bac0e56c2afb304ec12a