Lamport signature

Results: 38



#Item
31Second Preimage Attacks on Dithered Hash Functions Elena Andreeva1 , Charles Bouillaguet2 , Pierre-Alain Fouque2 ,

Second Preimage Attacks on Dithered Hash Functions Elena Andreeva1 , Charles Bouillaguet2 , Pierre-Alain Fouque2 ,

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2008-02-11 08:25:42
32Identity-based Chameleon Hash and Applications Giuseppe Ateniese Breno de Medeiros

Identity-based Chameleon Hash and Applications Giuseppe Ateniese Breno de Medeiros

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-03-15 18:18:40
33

PDF Document

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2009-04-08 18:56:03
34

PDF Document

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2004-11-23 22:12:43
35

PDF Document

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-01-16 13:27:53
36

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2005-03-09 20:13:37
37

PDF Document

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2002-05-08 21:58:28
38

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:22:52