Linked timestamping

Results: 7



#Item
1Cryptographic hash functions / Computer security / Hash tree / Peer-to-peer / Trusted timestamping / Hash function / Digital signature / Hash list / Linked timestamping / Cryptography / Hashing / Error detection and correction

Keyless Signatures’ Infrastructure: How to Build Global Distributed Hash-Trees Ahto Buldas1,2 , Andres Kroonmaa1 , and Risto Laanoja1,2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-15 18:39:49
2Cryptography / Hashing / Postage stamp / Linked timestamping / Computer security / Time / Cryptographic hash function

Protocols and data formats for time-stamping service 17th September 2002 Contents 1 Introduction

Add to Reading List

Source URL: www.timestamp.cyber.ee

Language: English - Date: 2003-01-29 09:32:12
3Error detection and correction / SHA-2 / SHA-1 / MD5 / Digital signature / Hash list / Hash function / Trusted timestamping / Linked timestamping / Cryptography / Cryptographic hash functions / Hashing

Long-lived digital integrity using short-lived hash functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:39:50
4Auditing / Electronic commerce / Public key certificate / Revocation list / Information technology security audit / Audit / Time clock / Linked timestamping / ISO/IEC 18014 / Cryptography / Public-key cryptography / Key management

Microsoft Word - TIME STAMPING GUIDELINES v 1.0.doc

Add to Reading List

Source URL: cca.gov.in

Language: English - Date: 2012-12-06 02:50:55
5Hash function / Claw-free permutation / Digital signature / Universal one-way hash function / Linked timestamping / Cryptography / Cryptographic hash functions / Hashing

How to Time-Stamp a Digital Document Stuart Haber [removed]

Add to Reading List

Source URL: www.anf.es

Language: English - Date: 2005-10-21 03:07:32
6Provable security / Public-key cryptography / Oracle machine / Oracle Corporation / Computer security / Standard model / Linked timestamping / Cryptography / Cryptographic hash functions / Random oracle

PDF Document

Add to Reading List

Source URL: dspace.utlib.ee

Language: English - Date: 2011-04-21 20:04:56
7Provable security / Public-key cryptography / Oracle machine / Oracle Corporation / Computer security / Standard model / Linked timestamping / Cryptography / Cryptographic hash functions / Random oracle

PDF Document

Add to Reading List

Source URL: dspace.utlib.ee

Language: English - Date: 2011-04-21 20:04:56
UPDATE