First Page | Document Content | |
---|---|---|
![]() Date: 2015-04-08 10:22:54Post-quantum cryptography Error detection and correction Cryptographic hash function Merkle signature scheme Digital signature Hash function Cryptography Public-key cryptography Hashing | Add to Reading List |
![]() | State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1 Cisco Systems, USADocID: 1oY9c - View Document |
![]() | draft-irtf-cfrg-xmss-hash-based-signatures-00 - XMSS: Extended Hash-Based SignaturesDocID: 1aZWa - View Document |
![]() | Defending against Sybil Attacks in Sensor Networks∗ Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning Cyber Defense Laboratory, Computer Science Department North Carolina State University, Raleigh, NC {qDocID: 17XFn - View Document |
![]() | PDF DocumentDocID: 17em7 - View Document |