Lamport signature

Results: 38



#Item
11An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees (extended and colored version of [7]) Fabien Coelho ´ CRI, Ecole des mines de Paris,

An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees (extended and colored version of [7]) Fabien Coelho ´ CRI, Ecole des mines de Paris,

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2008-06-22 07:14:34
12CS255: Cryptography and Computer Security  Winter 1999 Assignment #3

CS255: Cryptography and Computer Security Winter 1999 Assignment #3

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 1999-02-22 15:26:53
13Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees Dan Williams and Emin G¨un Sirer {djwill, egs}@cs.cornell.edu Department of Computer Science Cornell University

Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees Dan Williams and Emin G¨un Sirer {djwill, egs}@cs.cornell.edu Department of Computer Science Cornell University

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-03-20 00:13:33
14CS255: Cryptography and Computer Security  Winter 2003 Final Exam Instructions

CS255: Cryptography and Computer Security Winter 2003 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-01-04 13:22:38
15CS255: Cryptography and Computer Security  Winter 2003 Final Exam Instructions

CS255: Cryptography and Computer Security Winter 2003 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-03-10 16:54:18
16OneTouch 4.0 Scanned Documents

OneTouch 4.0 Scanned Documents

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-05-17 23:49:49
17CS255: Cryptography and Computer Security  Winter 2003 Final Exam Instructions

CS255: Cryptography and Computer Security Winter 2003 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-01-11 14:38:17
18Extendable-Output Functions (XOFs) Ray Perlner Computer Security Division, NIST [removed] SHA[removed]Workshop

Extendable-Output Functions (XOFs) Ray Perlner Computer Security Division, NIST [removed] SHA[removed]Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:11:38
19Efficient One-time Proxy Signatures Huaxiong Wang and Josef Pieprzyk Centre for Advanced Computing – Algorithms and Cryptography Department of Computing Macquarie University Sydney, NSW 2109, AUSTRALIA

Efficient One-time Proxy Signatures Huaxiong Wang and Josef Pieprzyk Centre for Advanced Computing – Algorithms and Cryptography Department of Computing Macquarie University Sydney, NSW 2109, AUSTRALIA

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
20Efficient Implementation of Keyless Signatures with Hash Sequence Authentication Ahto Buldas, Risto Laanoja, and Ahto Truu GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia.  Abstract. We present new ideas for decre

Efficient Implementation of Keyless Signatures with Hash Sequence Authentication Ahto Buldas, Risto Laanoja, and Ahto Truu GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. Abstract. We present new ideas for decre

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 05:03:49