First Page | Document Content | |
---|---|---|
Date: 2018-06-21 04:41:26Cryptography Post-quantum cryptography Public-key cryptography Hashing Error detection and correction Digital signature Hash chain XMSS Cryptographic hash function Merkle tree Hash function Key | Hash-based signatures Joost Rijneveld Radboud University, Nijmegen, The Netherlands Post-quantum cryptographyAdd to Reading ListSource URL: joostrijneveld.nlDownload Document from Source WebsiteFile Size: 154,27 KBShare Document on Facebook |
Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University Adrian PerrigDocID: 1phYN - View Document | |
SPV: Secure Path Vector Routing for Securing BGP ∗ Yih-Chun Hu Adrian PerrigDocID: 1oDfz - View Document | |
Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal Berry Schoenmakers Dept of Mathematics & Computer Science TU Eindhoven, The NetherlandsDocID: 1mkCs - View Document | |
Forensic Analysis of Database Tampering Kyriacos Pavlou Richard T. Snodgrass Department of Computer ScienceDocID: 18LEA - View Document | |
iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic? Jason Gionta1 , Peng Ning1 , and Xiaolan Zhang2 1 2DocID: 180eG - View Document |