Statements (57)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:currency
|
gptkbp:bfsLayer |
5
|
gptkbp:bfsParent |
gptkb:Jon_Callas
|
gptkbp:applies_to |
gptkb:software_framework
Information security Network security Secure messaging |
gptkbp:based_on |
Computational hardness assumptions
|
gptkbp:developed_by |
Cryptographers
|
https://www.w3.org/2000/01/rdf-schema#label |
Modern Cryptography
|
gptkbp:includes |
Asymmetric encryption
Hash functions Symmetric encryption |
gptkbp:is_associated_with |
Digital certificates
Public key infrastructure Encryption keys Secure protocols |
gptkbp:is_challenged_by |
gptkb:Quantum_computing
Cryptanalysis Emerging threats Regulatory changes |
gptkbp:is_critical_for |
gptkb:Company
|
gptkbp:is_documented_in |
Books
Research papers Online resources |
gptkbp:is_essential_for |
Privacy protection
|
gptkbp:is_evaluated_by |
Penetration testing
Security audits Vulnerability assessments |
gptkbp:is_explored_in |
Academic journals
Cryptographic research Security research |
gptkbp:is_influenced_by |
gptkb:Mathematician
Computer science Information theory |
gptkbp:is_integrated_with |
gptkb:Io_T_devices
Cloud services Web applications Mobile applications |
gptkbp:is_promoted_by |
gptkb:Workshops
Industry conferences Security awareness campaigns |
gptkbp:is_studied_in |
Research institutions
|
gptkbp:is_supported_by |
Commercial software
Open-source projects Standards organizations |
gptkbp:is_used_by |
gptkb:Individuals
Governments Corporations |
gptkbp:is_used_in |
Data protection
Digital signatures Secure transactions |
gptkbp:origin |
Technological advancements
|
gptkbp:purpose |
Secure communication
|
gptkbp:regulates |
Legal frameworks
|
gptkbp:training |
Universities
|
gptkbp:utilizes |
Mathematical algorithms
|