<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Elliptic curve cryptography / Digital Signature Standard / Key management / Elliptic Curve Digital Signature Algorithm / Digital signature / Digital Signature Algorithm / EdDSA / Key / Domain Name System Security Extensions / Homomorphic encryption
Date: 2018-02-28 05:05:12
Cryptography
Public-key cryptography
Elliptic curve cryptography
Digital Signature Standard
Key management
Elliptic Curve Digital Signature Algorithm
Digital signature
Digital Signature Algorithm
EdDSA
Key
Domain Name System Security Extensions
Homomorphic encryption

Short Double- and N -Times-Authentication-Preventing Signatures from ECDSA and More David Derler1 , Sebastian Ramacher1 , and Daniel Slamanig2 1

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 502,99 KB

Share Document on Facebook

Similar Documents

Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper  1

Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper 1

DocID: 1ov5N - View Document

EdDSA signatures and Ed25519 Peter Schwabe Joint work with Daniel J. Bernstein, Niels Duif, Tanja Lange, and Bo-Yin Yang March 20, 2012

EdDSA signatures and Ed25519 Peter Schwabe Joint work with Daniel J. Bernstein, Niels Duif, Tanja Lange, and Bo-Yin Yang March 20, 2012

DocID: 1niQQ - View Document