Lamport signature

Results: 38



#Item
21http://www.ietf.org/internet-drafts/draft-irtf-cfrg-rhash-00.txt

http://www.ietf.org/internet-drafts/draft-irtf-cfrg-rhash-00.txt

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:38:38
22High throughput asynchronous algorithms for message authentication Scott A Crosby and Dan S. Wallach Rice University December 14, 2010 Abstract

High throughput asynchronous algorithms for message authentication Scott A Crosby and Dan S. Wallach Rice University December 14, 2010 Abstract

Add to Reading List

Source URL: tamperevident.cs.rice.edu

Language: English - Date: 2010-12-14 09:05:23
23Signature Schemes with Bounded Leakage Resilience Jonathan Katz1? and Vinod Vaikuntanathan2 1  University of Maryland

Signature Schemes with Bounded Leakage Resilience Jonathan Katz1? and Vinod Vaikuntanathan2 1 University of Maryland

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:06:47
24CS255: Cryptography and Computer Security  Winter 2012 Final Exam Instructions:

CS255: Cryptography and Computer Security Winter 2012 Final Exam Instructions:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2013-02-22 13:28:17
25CS255: Cryptography and Computer Security  Winter 2007

CS255: Cryptography and Computer Security Winter 2007

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2008-03-10 18:06:00
26CS255: Cryptography and Computer Security  Winter 2003

CS255: Cryptography and Computer Security Winter 2003

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-01-06 01:59:49
27Cryptographic Hash Workshop[removed]Design Principles for Hsh Functions Revisited

Cryptographic Hash Workshop[removed]Design Principles for Hsh Functions Revisited

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:12:02
28Microsoft Outlook - Memo Style

Microsoft Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-11-05 14:22:31
29Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-04-11 11:06:58
30Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Add to Reading List

Source URL: imperia.rz.rub.de

Language: English - Date: 2009-12-11 06:33:14