Hash tree

Results: 206



#Item
91Error detection and correction / Search algorithms / Proof-of-work system / Lamport signature / Hash function / Hash tree / SHA-1 / Hash list / Crypt / Cryptography / Cryptographic hash functions / Hashing

An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees Technical Report A/390/CRI Fabien Coelho ´ CRI, Ecole des mines de Paris,

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2008-01-11 06:10:48
92Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: nakamotoinstitute.org

Language: English - Date: 2014-03-23 11:36:20
93Bitcoin / Peer-to-peer computing / Proof-of-work system / Commitment scheme / Hash tree / Consensus / Cryptographic hash function / RSA / Cryptography / Public-key cryptography / Hashing

CommitCoin: Carbon Dating Commitments with Bitcoin? Jeremy Clark1 and Aleksander Essex2 1 Carleton University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-15 00:09:47
94Information retrieval / Locality-sensitive hashing / Hash function / K-d tree / Search algorithms / Artificial intelligence / Information science

Microsoft PowerPoint - helsinki-2

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2007-08-11 15:06:23
95Cryptographic hash functions / Computer security / Hash tree / Peer-to-peer / Trusted timestamping / Hash function / Digital signature / Hash list / Linked timestamping / Cryptography / Hashing / Error detection and correction

Keyless Signatures’ Infrastructure: How to Build Global Distributed Hash-Trees Ahto Buldas1,2 , Andres Kroonmaa1 , and Risto Laanoja1,2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-15 18:39:49
96Hashing / Error detection and correction / Digital signature / Hash tree / SHA-2 / SHA-1 / RSA / Hash function / Merkle signature scheme / Cryptography / Cryptographic hash functions / Public-key cryptography

One-Time Signatures Revisited: Have They Become Practical? Dalit Naor∗ Amir Shenhav† Avishai Wool‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-02 02:25:54
97Post-quantum cryptography / Error detection and correction / Merkle signature scheme / Digital signature / Hash tree / Hash function / Electronic signature / Public key infrastructure / Digital Signature Algorithm / Cryptography / Public-key cryptography / Key management

Let Live and Let Die — Handling the State of Hash-based Signatures Stefan-Lukas Gazdag1 , Denis Butin2 , and Johannes Buchmann2 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:37:18
98Error detection and correction / Key management / Digital signature / Cryptographic hash function / Hash function / Hash tree / RSA / Lamport signature / Merkle signature scheme / Cryptography / Public-key cryptography / Hashing

SPHINCS: practical stateless hash-based signatures Daniel J. Bernstein1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , Ruben Niederhagen3 , Louiza Papachristodoulou4 , Michael Schneider,

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:36:42
99Error detection and correction / Search algorithms / Proof-of-work system / Lamport signature / Hash function / Hash tree / SHA-1 / Hash list / Trie / Cryptography / Cryptographic hash functions / Hashing

An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees (extended and colored version of [7]) Fabien Coelho ´ CRI, Ecole des mines de Paris,

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2008-06-22 07:14:34
100Oram / Time complexity / Hash table / Circuit / Binary tree / Theoretical computer science / Applied mathematics / Analysis of algorithms

SCORAM: Oblivious RAM for Secure Computation ∗ Xiao Shaun Wang

Add to Reading List

Source URL: i.cs.hku.hk

Language: English - Date: 2014-09-26 10:55:17
UPDATE