First Page | Document Content | |
---|---|---|
![]() Date: 2015-04-09 11:38:04Public-key cryptography Error detection and correction Merkle signature scheme Digital signature Hash function Hash tree Collision attack RSA MD5 Cryptography Hashing Cryptographic hash functions | Source URL: csrc.nist.govDownload Document from Source WebsiteFile Size: 550,29 KBShare Document on Facebook |
![]() | State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1 Cisco Systems, USADocID: 1oY9c - View Document |
![]() | draft-irtf-cfrg-xmss-hash-based-signatures-00 - XMSS: Extended Hash-Based SignaturesDocID: 1aZWa - View Document |
![]() | Defending against Sybil Attacks in Sensor Networks∗ Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning Cyber Defense Laboratory, Computer Science Department North Carolina State University, Raleigh, NC {qDocID: 17XFn - View Document |
![]() | PDF DocumentDocID: 17em7 - View Document |