Key ceremony (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Key ceremony" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
1,131st place
850th place
5,032nd place
3,357th place
8,991st place
6,535th place
214th place
176th place
low place
low place
low place
low place
low place
low place
2nd place
2nd place

cloudflare.com (Global: 8,991st place; English: 6,535th place)

d1c2gz5q23tkk0.cloudfront.net (Global: low place; English: low place)

doi.org (Global: 2nd place; English: 2nd place)

  • Gong, Yinjie; Jin, Yifei; Li, Yuchan; Liu, Ziyi; Zhu, Zhiyi (2022). "Analysis and comparison of the main zero-knowledge proof scheme". 2022 International Conference on Big Data, Information and Computer Network (BDICN). IEEE. pp. 366–372. doi:10.1109/BDICN55575.2022.00074. ISBN 978-1-6654-8476-3.

iacr.org (Global: 5,032nd place; English: 3,357th place)

eprint.iacr.org

  • Ellison, Carl (2007). "Ceremony Design and Analysis". Cryptology ePrint Archive, Paper 2007/399. Archived from the original on 2022-09-01. Retrieved 2023-08-13.
  • Bowe, Sean; Grigg, Jack; Hopwood, Daira (2019). "Recursive Proof Composition without a Trusted Setup". Cryptology ePrint Archive. Retrieved 2025-04-08.

ibm.com (Global: 1,131st place; English: 850th place)

ibm.com

public.dhe.ibm.com

redbooks.ibm.com

cloud.ibm.com

ietf.org (Global: 214th place; English: 176th place)

datatracker.ietf.org

verisign.com (Global: low place; English: low place)

blog.verisign.com

web.archive.org (Global: 1st place; English: 1st place)

  • Ellison, Carl (2007). "Ceremony Design and Analysis". Cryptology ePrint Archive, Paper 2007/399. Archived from the original on 2022-09-01. Retrieved 2023-08-13.
  • "The DNSSEC Root Signing Ceremony". Cloudflare. Archived from the original on 2022-11-20. Retrieved 2022-11-20.
  • "CEX7S / 4769 EP11". www.ibm.com. Archived from the original on 2020-02-21. Retrieved 2020-06-24.
  • "CEX7S / 4769 CCA". www.ibm.com. Archived from the original on 2020-02-21. Retrieved 2020-06-24.
  • "Enterprise PKCS#11 (EP11) Library structure" (PDF). public.dhe.ibm.com. Archived (PDF) from the original on 2020-06-29.
  • Master key is referred to as Wrapping Key (WK) in the EP11 documentation Archived 2020-06-29 at the Wayback Machine.
  • Getting Started with Linux on Z Encryption for Data At-Rest. 2016-09-30. Archived from the original on 2020-10-15. Retrieved 2020-06-24.
  • Streamline Management of the IBM z Systems Host Cryptographic Module Using IBM Trusted Key Entry. 2016-09-30. Archived from the original on 2020-06-26. Retrieved 2020-06-24.
  • "IBM Hyper Protect Services - Overview". www.ibm.com. Archived from the original on 2020-06-09. Retrieved 2020-06-24.
  • "IBM Cloud Hyper Protect Crypto Services FAQs". cloud.ibm.com. Archived from the original on 2023-04-06.
  • "EURL: A reliable euro-pegged digital asset" (PDF). uploads-ssl.webflow.com. February 2022. Archived (PDF) from the original on 16 March 2022. Retrieved 18 April 2022.

webflow.com (Global: low place; English: low place)

uploads-ssl.webflow.com