Hash chain

Results: 28



#Item
11Password / Hash chain / Certificate authority / Diffie–Hellman key exchange / Secure Remote Password protocol / Transport Layer Security / Cryptography / Cryptographic protocols / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2000 Programming Project #2 Due: Friday, March 10th 2000, 11:59pm

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-02-24 22:56:17
12Computing / Routing algorithms / Hashing / Cryptography / Cryptographic hash functions / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Hash chain / Distance-vector routing protocol / Routing protocols / Network architecture / Routing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: www.potaroo.net

Language: English - Date: 2007-11-04 03:24:11
13Routing / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Distance-vector routing protocol / Hash chain / Cryptographic hash function / Path vector protocol / Enhanced Interior Gateway Routing Protocol / Interior gateway protocol / Routing protocols / Network architecture / Computing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: users.crhc.illinois.edu

Language: English - Date: 2003-02-20 14:25:57
14Computing / Routing algorithms / Hashing / Cryptography / Cryptographic hash functions / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Hash chain / Distance-vector routing protocol / Routing protocols / Network architecture / Routing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2007-08-26 21:30:00
15Routing / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Distance-vector routing protocol / Hash chain / Cryptographic hash function / Path vector protocol / Enhanced Interior Gateway Routing Protocol / Interior gateway protocol / Routing protocols / Network architecture / Computing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: monarch.cs.rice.edu

Language: English - Date: 2003-02-20 14:25:57
16Computing / Routing algorithms / Hashing / Cryptography / Cryptographic hash functions / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Hash chain / Distance-vector routing protocol / Routing protocols / Network architecture / Routing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: monarch.cs.rice.edu

Language: English - Date: 2002-11-20 04:48:07
17Computing / Routing algorithms / Hashing / Cryptography / Cryptographic hash functions / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Hash chain / Distance-vector routing protocol / Routing protocols / Network architecture / Routing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: www.monarch.cs.rice.edu

Language: English - Date: 2002-11-20 04:48:07
18Routing / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Distance-vector routing protocol / Hash chain / Cryptographic hash function / Path vector protocol / Enhanced Interior Gateway Routing Protocol / Interior gateway protocol / Routing protocols / Network architecture / Computing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: www.monarch.cs.rice.edu

Language: English - Date: 2003-02-20 14:25:57
19Computing / Routing algorithms / Hashing / Cryptography / Cryptographic hash functions / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Hash chain / Distance-vector routing protocol / Routing protocols / Network architecture / Routing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2003-04-07 16:01:07
20Error detection and correction / Search algorithms / Random oracle / Hash tree / Hash function / Hash chain / Oracle machine / Hash list / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hashing

Security Proofs for the BLT Signature Scheme Ahto Buldas, Risto Laanoja, and Ahto Truu GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. Abstract. We present security proofs for the BLT signature scheme in the mode

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-04 03:31:48
UPDATE