First Page | Document Content | |
---|---|---|
Date: 2018-06-25 08:42:52Cryptography Public-key cryptography Post-quantum cryptography Hashing Hash-based cryptography XMSS Cryptographic hash function Merkle signature scheme Digital signature HMAC RSA Power analysis | Physical Attack Vulnerability of Hash-Based Signature Schemes Verwundbarkeit von Hash-basierten Signaturverfahren durch Physikalische Angriffe Master-Thesis von Matthias Julius Kannwischer Tag der Einreichung:Add to Reading ListSource URL: kannwischer.euDownload Document from Source WebsiteFile Size: 3,19 MBShare Document on Facebook |
State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1 Cisco Systems, USADocID: 1oY9c - View Document | |
draft-irtf-cfrg-xmss-hash-based-signatures-00 - XMSS: Extended Hash-Based SignaturesDocID: 1aZWa - View Document | |
Defending against Sybil Attacks in Sensor Networks∗ Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning Cyber Defense Laboratory, Computer Science Department North Carolina State University, Raleigh, NC {qDocID: 17XFn - View Document | |
PDF DocumentDocID: 17em7 - View Document |