<--- Back to Details
First PageDocument Content
Post-quantum cryptography / Error detection and correction / Cryptographic hash function / Merkle signature scheme / Digital signature / Hash function / Cryptography / Public-key cryptography / Hashing
Date: 2015-04-08 10:22:54
Post-quantum cryptography
Error detection and correction
Cryptographic hash function
Merkle signature scheme
Digital signature
Hash function
Cryptography
Public-key cryptography
Hashing

draft-irtf-cfrg-xmss-hash-based-signatures-00 - XMSS: Extended Hash-Based Signatures

Add to Reading List

Source URL: tools.ietf.org

Download Document from Source Website

File Size: 175,37 KB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Key management / Digital signature / Post-quantum cryptography / Key / Elliptic Curve Digital Signature Algorithm / RSA / Cryptographic hash function / Merkle signature scheme / Lamport signature

State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1 Cisco Systems, USA

DocID: 1oY9c - View Document

Post-quantum cryptography / Error detection and correction / Cryptographic hash function / Merkle signature scheme / Digital signature / Hash function / Cryptography / Public-key cryptography / Hashing

draft-irtf-cfrg-xmss-hash-based-signatures-00 - XMSS: Extended Hash-Based Signatures

DocID: 1aZWa - View Document

Wireless sensor network / Computer programming / Technology / Merkle signature scheme / Kademlia / Distributed data storage / Computing / Binary tree

Defending against Sybil Attacks in Sensor Networks∗ Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning Cyber Defense Laboratory, Computer Science Department North Carolina State University, Raleigh, NC {q

DocID: 17XFn - View Document

Public-key cryptography / Error detection and correction / Merkle signature scheme / Digital signature / Hash function / Hash tree / Collision attack / RSA / MD5 / Cryptography / Hashing / Cryptographic hash functions

PDF Document

DocID: 17em7 - View Document