First Page | Document Content | |
---|---|---|
Date: 2012-04-18 06:08:49Forking lemma Random oracle Preimage attack Digital signature Collision resistance Elliptic Curve DSA Standard model MD5 Birthday attack Cryptography Cryptographic hash functions Schnorr signature | Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, SwitzerlandAdd to Reading ListSource URL: www.neven.orgDownload Document from Source WebsiteFile Size: 371,71 KBShare Document on Facebook |