<--- Back to Details
First PageDocument Content
Cryptography / Post-quantum cryptography / Public-key cryptography / Hashing / Error detection and correction / Digital signature / Hash chain / XMSS / Cryptographic hash function / Merkle tree / Hash function / Key
Date: 2018-06-21 04:41:26
Cryptography
Post-quantum cryptography
Public-key cryptography
Hashing
Error detection and correction
Digital signature
Hash chain
XMSS
Cryptographic hash function
Merkle tree
Hash function
Key

Hash-based signatures Joost Rijneveld Radboud University, Nijmegen, The Netherlands Post-quantum cryptography

Add to Reading List

Source URL: joostrijneveld.nl

Download Document from Source Website

File Size: 154,27 KB

Share Document on Facebook

Similar Documents

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University   Adrian Perrig

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University Adrian Perrig

DocID: 1phYN - View Document

SPV: Secure Path Vector Routing for Securing BGP  ∗ Yih-Chun Hu Adrian Perrig

SPV: Secure Path Vector Routing for Securing BGP ∗ Yih-Chun Hu Adrian Perrig

DocID: 1oDfz - View Document

Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal Berry Schoenmakers Dept of Mathematics & Computer Science TU Eindhoven, The Netherlands

Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal Berry Schoenmakers Dept of Mathematics & Computer Science TU Eindhoven, The Netherlands

DocID: 1mkCs - View Document

Forensic Analysis of Database Tampering Kyriacos Pavlou Richard T. Snodgrass  Department of Computer Science

Forensic Analysis of Database Tampering Kyriacos Pavlou Richard T. Snodgrass Department of Computer Science

DocID: 18LEA - View Document

iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic? Jason Gionta1 , Peng Ning1 , and Xiaolan Zhang2 1  2

iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic? Jason Gionta1 , Peng Ning1 , and Xiaolan Zhang2 1 2

DocID: 180eG - View Document