<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Key management / Digital signature / Post-quantum cryptography / Key / Elliptic Curve Digital Signature Algorithm / RSA / Cryptographic hash function / Merkle signature scheme / Lamport signature
Date: 2016-04-06 13:04:46
Cryptography
Public-key cryptography
Key management
Digital signature
Post-quantum cryptography
Key
Elliptic Curve Digital Signature Algorithm
RSA
Cryptographic hash function
Merkle signature scheme
Lamport signature

State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1 Cisco Systems, USA

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 364,82 KB

Share Document on Facebook

Similar Documents

State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1  Cisco Systems, USA

State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1 Cisco Systems, USA

DocID: 1oY9c - View Document

draft-irtf-cfrg-xmss-hash-based-signatures-00 - XMSS: Extended Hash-Based Signatures

draft-irtf-cfrg-xmss-hash-based-signatures-00 - XMSS: Extended Hash-Based Signatures

DocID: 1aZWa - View Document

Defending against Sybil Attacks in Sensor Networks∗ Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning Cyber Defense Laboratory, Computer Science Department North Carolina State University, Raleigh, NC {q

Defending against Sybil Attacks in Sensor Networks∗ Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning Cyber Defense Laboratory, Computer Science Department North Carolina State University, Raleigh, NC {q

DocID: 17XFn - View Document

PDF Document

DocID: 17em7 - View Document