<--- Back to Details
First PageDocument Content
Forking lemma / Random oracle / Preimage attack / Digital signature / Collision resistance / Elliptic Curve DSA / Standard model / MD5 / Birthday attack / Cryptography / Cryptographic hash functions / Schnorr signature
Date: 2012-04-18 06:08:49
Forking lemma
Random oracle
Preimage attack
Digital signature
Collision resistance
Elliptic Curve DSA
Standard model
MD5
Birthday attack
Cryptography
Cryptographic hash functions
Schnorr signature

Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, Switzerland

Add to Reading List

Source URL: www.neven.org

Download Document from Source Website

File Size: 371,71 KB

Share Document on Facebook

Similar Documents

Deterministic wallets  End Deterministic wallets Gregory Maxwell et. al.

Deterministic wallets End Deterministic wallets Gregory Maxwell et. al.

DocID: 1gGjd - View Document

Internet Engineering Task Force (IETF) Request for Comments: 6380 Category: Informational ISSN: K. Burgin

Internet Engineering Task Force (IETF) Request for Comments: 6380 Category: Informational ISSN: K. Burgin

DocID: 1avEc - View Document

Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1  IBM Research – Zurich, Switzerland

Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, Switzerland

DocID: 19LBC - View Document

May 20, 2011  Smart card implementation of a digital signature scheme for Twisted Edwards curves Author: Niels Duif∗

May 20, 2011 Smart card implementation of a digital signature scheme for Twisted Edwards curves Author: Niels Duif∗

DocID: 19d9u - View Document

Japan Cryptographic Module Validation Program(JCMVP)  Specifications of Cryptographic Algorithm Implementation Testing — Key Establishment Schemes —

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Key Establishment Schemes —

DocID: 18KxF - View Document