Hash-based cryptography

Results: 78



#Item
1Hash-based signatures Joost Rijneveld  Radboud University, Nijmegen, The Netherlands  Post-quantum cryptography

Hash-based signatures Joost Rijneveld Radboud University, Nijmegen, The Netherlands Post-quantum cryptography

Add to Reading List

Source URL: joostrijneveld.nl

Language: English - Date: 2018-06-21 04:41:26
2W-OTS+ – Shorter Signatures for Hash-Based Signature Schemes Andreas H¨ ulsing?  Cryptography and Computeralgebra

W-OTS+ – Shorter Signatures for Hash-Based Signature Schemes Andreas H¨ ulsing? Cryptography and Computeralgebra

Add to Reading List

Source URL: huelsing.files.wordpress.com

Language: English - Date: 2013-05-21 05:30:06
    3Hash-based Signatures in Practice Starting the transition to post-quantum cryptography Stefan-Lukas Gazdag PQCrypto –

    Hash-based Signatures in Practice Starting the transition to post-quantum cryptography Stefan-Lukas Gazdag PQCrypto –

    Add to Reading List

    Source URL: 2017.pqcrypto.org

    Language: English - Date: 2017-06-27 05:20:35
      4Cryptographic Hash Functions Part I Cryptography 1 Andreas Hülsing, TU/e Based on slides by Sebastiaan de Hoogh, TU/e

      Cryptographic Hash Functions Part I Cryptography 1 Andreas Hülsing, TU/e Based on slides by Sebastiaan de Hoogh, TU/e

      Add to Reading List

      Source URL: www.hyperelliptic.org

      Language: English - Date: 2016-09-29 20:50:51
        5How to Configure Identical Credentials Configuration Guide

        How to Configure Identical Credentials Configuration Guide

        Add to Reading List

        Source URL: www.yubico.com

        Language: English - Date: 2016-06-22 18:25:41
        6Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

        Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

        Add to Reading List

        Source URL: keccak.noekeon.org

        Language: English - Date: 2013-02-27 15:26:40
        71  Stronger Attacks on Causality-Based Key Agreement Benno Salwey and Stefan Wolf Faculty of Informatics, Universit`a della Svizzera Italiana, Via G. Buffi 13, 6900 Lugano, Switzerland

        1 Stronger Attacks on Causality-Based Key Agreement Benno Salwey and Stefan Wolf Faculty of Informatics, Universit`a della Svizzera Italiana, Via G. Buffi 13, 6900 Lugano, Switzerland

        Add to Reading List

        Source URL: cqi.inf.usi.ch

        Language: English - Date: 2016-01-25 05:30:01
        8FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

        FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2016-05-26 13:27:36
        9Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

        Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2016-07-27 10:26:48
        10Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)

        Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)

        Add to Reading List

        Source URL: www.andrew.cmu.edu

        Language: English - Date: 2016-01-24 20:37:43