Merkle signature scheme

Results: 17



#Item
1State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1  Cisco Systems, USA

State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1 Cisco Systems, USA

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-04-06 13:04:46
2draft-irtf-cfrg-xmss-hash-based-signatures-00 - XMSS: Extended Hash-Based Signatures

draft-irtf-cfrg-xmss-hash-based-signatures-00 - XMSS: Extended Hash-Based Signatures

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-04-08 10:22:54
3Defending against Sybil Attacks in Sensor Networks∗ Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning Cyber Defense Laboratory, Computer Science Department North Carolina State University, Raleigh, NC {q

Defending against Sybil Attacks in Sensor Networks∗ Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning Cyber Defense Laboratory, Computer Science Department North Carolina State University, Raleigh, NC {q

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:15
4

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:38:04
5One-Time Signatures Revisited: Have They Become Practical? Dalit Naor∗ Amir Shenhav†  Avishai Wool‡

One-Time Signatures Revisited: Have They Become Practical? Dalit Naor∗ Amir Shenhav† Avishai Wool‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-02 02:25:54
6Let Live and Let Die — Handling the State of  Hash-based Signatures Stefan-Lukas Gazdag1 , Denis Butin2 , and Johannes Buchmann2 1

Let Live and Let Die — Handling the State of Hash-based Signatures Stefan-Lukas Gazdag1 , Denis Butin2 , and Johannes Buchmann2 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:37:18
7SPHINCS: practical stateless hash-based signatures Daniel J. Bernstein1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , Ruben Niederhagen3 , Louiza Papachristodoulou4 , Michael Schneider,

SPHINCS: practical stateless hash-based signatures Daniel J. Bernstein1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , Ruben Niederhagen3 , Louiza Papachristodoulou4 , Michael Schneider,

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:36:42
8Structural Signatures for Tree Data Structures Ashish Kundu Elisa Bertino  Department of Computer Science, Purdue

Structural Signatures for Tree Data Structures Ashish Kundu Elisa Bertino Department of Computer Science, Purdue

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2008-10-22 09:22:53
9High throughput asynchronous algorithms for message authentication Scott A Crosby and Dan S. Wallach Rice University December 14, 2010 Abstract

High throughput asynchronous algorithms for message authentication Scott A Crosby and Dan S. Wallach Rice University December 14, 2010 Abstract

Add to Reading List

Source URL: tamperevident.cs.rice.edu

Language: English - Date: 2010-12-14 09:05:23