First Page | Document Content | |
---|---|---|
Date: 2018-06-21 04:41:26Cryptography Post-quantum cryptography Public-key cryptography Hashing Error detection and correction Digital signature Hash chain XMSS Cryptographic hash function Merkle tree Hash function Key | Hash-based signatures Joost Rijneveld Radboud University, Nijmegen, The Netherlands Post-quantum cryptographyAdd to Reading ListSource URL: joostrijneveld.nlDownload Document from Source WebsiteFile Size: 154,27 KBShare Document on Facebook |
Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University Adrian PerrigDocID: 1phYN - View Document | |
Microsoft Word - Indo-US-Workshop-jaja.docDocID: 1oUI6 - View Document | |
SPV: Secure Path Vector Routing for Securing BGP ∗ Yih-Chun Hu Adrian PerrigDocID: 1oDfz - View Document | |
Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow onlineDocID: 1ov99 - View Document | |
The Future of Massively Distributed Services on the Internet Mark Hapner Sun MicrosystemsDocID: 1otZ9 - View Document |