Merkle tree

Results: 29



#Item
21Cryptographic hash functions / Error detection and correction / Hash tree / Digital signature / Cryptographic primitive / Merkle signature scheme / Lamport signature / Cryptography / Hashing / Public-key cryptography

High throughput asynchronous algorithms for message authentication Scott A Crosby and Dan S. Wallach Rice University December 14, 2010 Abstract

Add to Reading List

Source URL: tamperevident.cs.rice.edu

Language: English - Date: 2010-12-14 09:05:23
22Computing / Cryptographic hash functions / Information / Internet protocols / Internet standards / Hash tree / Hash list / Hash function / Transport Layer Security / Hashing / Error detection and correction / Cryptography

Merkle Tree Authentication of HTTP Responses Roberto J. Bayardo Jeffrey Sorensen IBM Almaden Research Center

Add to Reading List

Source URL: www2005.org

Language: English - Date: 2005-04-05 14:58:32
23Search algorithms / Hashing / Trie / Hash tree / Hash function / Revocation list / Merkle signature scheme / Cryptography / Error detection and correction / Binary trees

Revocation Transparency Ben Laurie ([removed]) Emilia Kasper ([removed]) Introduction Like Certificate Transparency, only for revocation. Unlike CT, RT needs a recent status for the

Add to Reading List

Source URL: sump2.links.org

Language: English - Date: 2012-09-11 10:55:10
24Error detection and correction / Information retrieval / Artificial intelligence / Information science / Cryptography / Hash function / Merkle–Damgård construction / Hash tree / Tabulation hashing / Hashing / Cryptographic hash functions / Search algorithms

Sufficient conditions for sound tree and sequential hashing modes Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1 2

Add to Reading List

Source URL: sponge.noekeon.org

Language: English - Date: 2013-02-27 15:27:45
25Post-quantum cryptography / Hashing / Merkle signature scheme / Hash tree / Digital signature / SHA-2 / RSA / SHA-1 / Hash function / Cryptography / Cryptographic hash functions / Public-key cryptography

2006 IEEE 24th Convention of Electrical and Electronics Engineers in Israel One-Time Signatures Revisited: Practical Fast Signatures Using Fractal Merkle Tree Traversal Dalit Naor∗ Amir Shenhav† Avishai Wool‡

Add to Reading List

Source URL: www.eng.tau.ac.il

Language: English - Date: 2006-11-22 02:16:55
26Error detection and correction / Preimage attack / Search algorithms / Hash function / Collision attack / Birthday attack / Hash tree / Padding / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / Hashing

Herding, Second Preimage and Trojan Message Attacks Beyond Merkle-Damg˚ ard

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-02-02 00:00:00
27Cryptographic hash function / Hash tree / Digital signature / Collision resistance / Hash function / Lamport signature / One-way compression function / Cryptography / Preimage attack / Merkle signature scheme

Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-04-11 11:06:58
28Error detection and correction / Key management / Merkle signature scheme / Cryptographic hash function / Digital signature / Hash tree / Key generation / Cryptographically secure pseudorandom number generator / Trie / Cryptography / Public-key cryptography / Hashing

Merkle Signatures with Virtually Unlimited Signature Capacity Johannes Buchmann1 , Erik Dahmen1 , Elena Klintsevich1 ,

Add to Reading List

Source URL: www.cdc.informatik.tu-darmstadt.de

Language: English - Date: 2007-07-10 07:26:05
29Cryptographic hash function / Hash tree / Digital signature / Collision resistance / Hash function / Lamport signature / One-way compression function / Cryptography / Preimage attack / Merkle signature scheme

Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Add to Reading List

Source URL: imperia.rz.rub.de

Language: English - Date: 2009-12-11 06:33:14
UPDATE