Back to Results
First PageMeta Content
Hashing / Error detection and correction / Digital signature / Hash tree / SHA-2 / SHA-1 / RSA / Hash function / Merkle signature scheme / Cryptography / Cryptographic hash functions / Public-key cryptography


One-Time Signatures Revisited: Have They Become Practical? Dalit Naor∗ Amir Shenhav† Avishai Wool‡
Add to Reading List

Document Date: 2005-12-02 02:25:54


Open Document

File Size: 208,92 KB

Share Result on Facebook

City

Ramat Aviv / /

Company

AES / uSec / Microsoft / IBM / /

Country

Israel / /

/

Facility

Tel Aviv University / /

IndustryTerm

scheme algorithms / tree traversal algorithm / digital signature algorithms / online/offline variants / sensor networks / software implementation / on-line/off-line scheme / authentication solutions / tree algorithm / radio communications / /

OperatingSystem

Windows XP / XP / Microsoft Windows / /

Organization

Tel Aviv University / U.S. Securities and Exchange Commission / School of Electrical Engineering / /

Person

Rabin / Dalit Naor∗ Amir Shenhav / Amir Shenhav† Avishai Wool / /

Product

Windows XP / Rogaway / Bellare / using Bellare / /

Technology

three algorithms / fractal Merkle tree algorithm / public key / api / block cipher / FMTseq scheme algorithms / digital signature algorithms / secret key / 2.2 Algorithm / fractal Merkle tree traversal algorithm / operating system / digital signature / stream cipher / /

SocialTag