Merkle tree

Results: 29



#Item
21High throughput asynchronous algorithms for message authentication Scott A Crosby and Dan S. Wallach Rice University December 14, 2010 Abstract

High throughput asynchronous algorithms for message authentication Scott A Crosby and Dan S. Wallach Rice University December 14, 2010 Abstract

Add to Reading List

Source URL: tamperevident.cs.rice.edu

Language: English - Date: 2010-12-14 09:05:23
22Merkle Tree Authentication of HTTP Responses Roberto J. Bayardo Jeffrey Sorensen  IBM Almaden Research Center

Merkle Tree Authentication of HTTP Responses Roberto J. Bayardo Jeffrey Sorensen IBM Almaden Research Center

Add to Reading List

Source URL: www2005.org

Language: English - Date: 2005-04-05 14:58:32
23Revocation Transparency Ben Laurie ([removed]) Emilia Kasper ([removed]) Introduction Like Certificate Transparency, only for revocation. Unlike CT, RT needs a recent status for the

Revocation Transparency Ben Laurie ([removed]) Emilia Kasper ([removed]) Introduction Like Certificate Transparency, only for revocation. Unlike CT, RT needs a recent status for the

Add to Reading List

Source URL: sump2.links.org

Language: English - Date: 2012-09-11 10:55:10
24Sufficient conditions for sound tree and sequential hashing modes Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1 2

Sufficient conditions for sound tree and sequential hashing modes Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1 2

Add to Reading List

Source URL: sponge.noekeon.org

Language: English - Date: 2013-02-27 15:27:45
252006 IEEE 24th Convention of Electrical and Electronics Engineers in Israel  One-Time Signatures Revisited: Practical Fast Signatures Using Fractal Merkle Tree Traversal Dalit Naor∗ Amir Shenhav† Avishai Wool‡

2006 IEEE 24th Convention of Electrical and Electronics Engineers in Israel One-Time Signatures Revisited: Practical Fast Signatures Using Fractal Merkle Tree Traversal Dalit Naor∗ Amir Shenhav† Avishai Wool‡

Add to Reading List

Source URL: www.eng.tau.ac.il

Language: English - Date: 2006-11-22 02:16:55
26Herding, Second Preimage and Trojan Message Attacks Beyond Merkle-Damg˚ ard

Herding, Second Preimage and Trojan Message Attacks Beyond Merkle-Damg˚ ard

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-02-02 00:00:00
27Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-04-11 11:06:58
28Merkle Signatures with Virtually Unlimited Signature Capacity Johannes Buchmann1 , Erik Dahmen1 , Elena Klintsevich1 ,

Merkle Signatures with Virtually Unlimited Signature Capacity Johannes Buchmann1 , Erik Dahmen1 , Elena Klintsevich1 ,

Add to Reading List

Source URL: www.cdc.informatik.tu-darmstadt.de

Language: English - Date: 2007-07-10 07:26:05
29Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Add to Reading List

Source URL: imperia.rz.rub.de

Language: English - Date: 2009-12-11 06:33:14