Back to Results
First PageMeta Content
Hashing / Hash function / Digital signature / MD5 / Lamport signature / Hash table / Cryptography / Cryptographic hash functions / Search algorithms


Appears in Advances in Cryptology { Crypto 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Springer-Verlag, Y. Desmedt, ed., 1994. Incremental Cryptography: The Case of Hashing and Signing 
Add to Reading List

Document Date: 1998-07-30 11:58:58


Open Document

File Size: 258,61 KB

Share Result on Facebook

City

La Jolla / Rehovot / Jerusalem / /

Company

Gp / Vf / Incrementality / MIT Laboratory / /

Country

Israel / /

/

Facility

Technology Square / Weizmann Institute of Science / University of California / /

IndustryTerm

legitimate update algorithm / probabilistic algorithm / incremental algorithms / namely nger-printing / polynomial time verifying algorithm / polynomial time hash evaluation algorithm / update algorithm / nger-printing / /

Organization

National Science Foundation / MIT / Department of Computer Science & Engineering / Department of Applied Mathematics and Computer Science / US-Israel Binational Science Foundation / University of California at San Diego / Weizmann Institute of Science / /

Person

Van Antwerpen / Chaum Antwerpen / /

ProvinceOrState

California / /

Technology

encryption / 3.3 An update algorithm / Cryptography / RAM / update algorithm / PPT algorithm / legitimate update algorithm / constructed algorithm / signing algorithm / The polynomial time hash evaluation algorithm / private key / PPT signing algorithm / random access / digital signature / following algorithms / polynomial time verifying algorithm / probabilistic algorithm / 545 Technology / /

SocialTag