Merkle tree

Results: 29



#Item
11Public-key cryptography / Error detection and correction / Merkle signature scheme / Digital signature / Hash function / Hash tree / Collision attack / RSA / MD5 / Cryptography / Hashing / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:38:04
12Error detection and correction / Search algorithms / Proof-of-work system / Lamport signature / Hash function / Hash tree / SHA-1 / Hash list / Crypt / Cryptography / Cryptographic hash functions / Hashing

An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees Technical Report A/390/CRI Fabien Coelho ´ CRI, Ecole des mines de Paris,

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2008-01-11 06:10:48
13Hashing / Error detection and correction / Digital signature / Hash tree / SHA-2 / SHA-1 / RSA / Hash function / Merkle signature scheme / Cryptography / Cryptographic hash functions / Public-key cryptography

One-Time Signatures Revisited: Have They Become Practical? Dalit Naor∗ Amir Shenhav† Avishai Wool‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-02 02:25:54
14Post-quantum cryptography / Error detection and correction / Merkle signature scheme / Digital signature / Hash tree / Hash function / Electronic signature / Public key infrastructure / Digital Signature Algorithm / Cryptography / Public-key cryptography / Key management

Let Live and Let Die — Handling the State of Hash-based Signatures Stefan-Lukas Gazdag1 , Denis Butin2 , and Johannes Buchmann2 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:37:18
15Error detection and correction / Key management / Digital signature / Cryptographic hash function / Hash function / Hash tree / RSA / Lamport signature / Merkle signature scheme / Cryptography / Public-key cryptography / Hashing

SPHINCS: practical stateless hash-based signatures Daniel J. Bernstein1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , Ruben Niederhagen3 , Louiza Papachristodoulou4 , Michael Schneider,

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:36:42
16Error detection and correction / Search algorithms / Proof-of-work system / Lamport signature / Hash function / Hash tree / SHA-1 / Hash list / Trie / Cryptography / Cryptographic hash functions / Hashing

An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees (extended and colored version of [7]) Fabien Coelho ´ CRI, Ecole des mines de Paris,

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2008-06-22 07:14:34
17Error detection and correction / Search algorithms / Hash tree / Hash list / Hash function / SHA-1 / Hash table / Lamport signature / Cryptographic hash functions / Hashing / Cryptography

Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees Dan Williams and Emin G¨un Sirer {djwill, egs}@cs.cornell.edu Department of Computer Science Cornell University

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-03-20 00:13:33
18Computing / Data structures / Tree traversal / Hashing / Merkle signature scheme / Tree / B-tree / Cryptographic hash function / R-tree / Binary trees / Cryptography / Graph theory

Structural Signatures for Tree Data Structures Ashish Kundu Elisa Bertino Department of Computer Science, Purdue

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2008-10-22 09:22:53
19Keccak / NIST hash function competition / SHA-2 / Preimage attack / Merkle–Damgård construction / Crypt / Hash tree / SHA-1 / Secure Hash Standard / Cryptographic hash functions / Error detection and correction / Cryptography

SHA-3 Standard: Overview, Status, Public Comment

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:11:37
20Cryptography / Search algorithms / Computing / Information retrieval / Hash tree / Hash list / Hash function / MD5 / Merkle–Damgård construction / Hashing / Cryptographic hash functions / Error detection and correction

Z:rentWorkding-paperding.dvi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:26:36
UPDATE