Lamport signature

Results: 38



#Item
1State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1  Cisco Systems, USA

State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1 Cisco Systems, USA

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-04-06 13:04:46
2llllllllllllllllillllllllllllllllllllllllllllllllllllllllllllllllllllllilli US005434919A United States Patent]

llllllllllllllllillllllllllllllllllllllllllllllllllllllllllllllllllllllilli US005434919A United States Patent]

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:08:29
3On the Instantiability of Hash-and-Sign RSA Signatures Yevgeniy Dodis1 , Iftach Haitner2⋆ , and Aris Tentes1 1  2

On the Instantiability of Hash-and-Sign RSA Signatures Yevgeniy Dodis1 , Iftach Haitner2⋆ , and Aris Tentes1 1 2

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2013-06-11 04:12:51
4

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 15:13:59
5Chameleon Signature from Bilinear Pairing

Chameleon Signature from Bilinear Pairing

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-17 03:10:04
6Chapter 12 Digital signatures In the public key setting, the primitive used to provide data integrity is a digital signature scheme. In this chapter we look at security notions and constructions for this primitive.

Chapter 12 Digital signatures In the public key setting, the primitive used to provide data integrity is a digital signature scheme. In this chapter we look at security notions and constructions for this primitive.

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:36:52
7Appears in Advances in Cryptology { Crypto 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Springer-Verlag, Y. Desmedt, ed., 1994. Incremental Cryptography: The Case of Hashing and Signing 

Appears in Advances in Cryptology { Crypto 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Springer-Verlag, Y. Desmedt, ed., 1994. Incremental Cryptography: The Case of Hashing and Signing 

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1998-07-30 11:58:58
8An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees Technical Report A/390/CRI Fabien Coelho ´ CRI, Ecole des mines de Paris,

An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees Technical Report A/390/CRI Fabien Coelho ´ CRI, Ecole des mines de Paris,

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2008-01-11 06:10:48
9SPHINCS:  practical stateless hash-based signatures Daniel J. Bernstein

SPHINCS: practical stateless hash-based signatures Daniel J. Bernstein

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 14:44:49
10SPHINCS: practical stateless hash-based signatures Daniel J. Bernstein1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , Ruben Niederhagen3 , Louiza Papachristodoulou4 , Michael Schneider,

SPHINCS: practical stateless hash-based signatures Daniel J. Bernstein1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , Ruben Niederhagen3 , Louiza Papachristodoulou4 , Michael Schneider,

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:36:42