Back to Results
First PageMeta Content
Post-quantum cryptography / Error detection and correction / Merkle signature scheme / Digital signature / Hash tree / Hash function / Electronic signature / Public key infrastructure / Digital Signature Algorithm / Cryptography / Public-key cryptography / Key management


Let Live and Let Die — Handling the State of Hash-based Signatures Stefan-Lukas Gazdag1 , Denis Butin2 , and Johannes Buchmann2 1
Add to Reading List

Document Date: 2015-04-09 11:37:18


Open Document

File Size: 307,28 KB

Share Result on Facebook

City

Hash / Katsikas / Darmstadt / Presentation Outline Hash / /

Company

Quantum Computer / Simmons / Bernstein / Abrosimov N.V. / /

Country

Germany / /

/

IndustryTerm

Contemporary software / cryptographic software / different applications / phonebook-like services / Internet-Draft / infrequent software / digital signature algorithms / nd applications / computing / possible solutions / web homepages / security protocols / /

Organization

Technische Universität Darmstadt / Internet Engineering Task Force / /

Person

Buchmann / Secure Signatures / Hopwood / /

Position

D.J. / Forward / /

ProvinceOrState

S.K. / /

PublishedMedium

Cryptology ePrint Archive / Lecture Notes in Computer Science / /

Technology

cryptography / Public Key Infrastructure / public key / TLS protocol / DiffieHellman protocol / Polynomial-Time Algorithms / PKI / digital signature algorithms / Private key / security protocols / virtual memory / digital signature / data connection encryption / /

URL

http /

SocialTag