Hash chain

Results: 28



#Item
21Efficient Implementation of Keyless Signatures with Hash Sequence Authentication Ahto Buldas, Risto Laanoja, and Ahto Truu GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia.  Abstract. We present new ideas for decre

Efficient Implementation of Keyless Signatures with Hash Sequence Authentication Ahto Buldas, Risto Laanoja, and Ahto Truu GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. Abstract. We present new ideas for decre

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 05:03:49
22American football plays / Canadian football / Official / Touchback / Eligible receiver / American football / Referee / Field goal / Wide receiver / Football / Sports / Gridiron football

FIVE MAN MECHANICS KEY SITUATIONS 2013 I. KICKOFF A. Referee. Goal line between hash mark & sidelines. Chain Side.

Add to Reading List

Source URL: www.easternnebraskaofficials.org

Language: English - Date: 2013-09-03 15:48:34
23Efficient Record-Level Keyless Signatures for Audit Logs Ahto Buldas1 , Ahto Truu1 , Risto Laanoja1 , and Rainer Gerhards2 1 Guardtime AS, Tallinn, Estonia {ahto.buldas,ahto.truu,risto.laanoja}@guardtime.com

Efficient Record-Level Keyless Signatures for Audit Logs Ahto Buldas1 , Ahto Truu1 , Risto Laanoja1 , and Rainer Gerhards2 1 Guardtime AS, Tallinn, Estonia {ahto.buldas,ahto.truu,risto.laanoja}@guardtime.com

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-15 10:18:50
24TALES FROM THE CRYPT0  INTRODUCTION

TALES FROM THE CRYPT0 INTRODUCTION

Add to Reading List

Source URL: www.aurainfosec.com

Language: English - Date: 2014-05-08 23:39:32
25Programming Assignment 1  Winter 2014 CS 255: Intro to Cryptography Due Jan[removed]:59pm

Programming Assignment 1 Winter 2014 CS 255: Intro to Cryptography Due Jan[removed]:59pm

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-01-13 17:00:26
26CS255: Cryptography and Computer Security  Winter 2007

CS255: Cryptography and Computer Security Winter 2007

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2008-03-10 18:06:00
27Rule 1 The Field Section 1 Dimensions PLAYING LINES

Rule 1 The Field Section 1 Dimensions PLAYING LINES

Add to Reading List

Source URL: static.nfl.com

Language: English - Date: 2012-10-15 18:55:07
28

PDF Document

Add to Reading List

Source URL: www.cs.ut.ee

Language: English - Date: 2006-03-20 09:54:54