Date: 2017-12-13 06:49:27Cryptography Hashing Search algorithms Cryptographic hash functions Error detection and correction Hash function Digital signature Collision resistance Hash Trapdoor function Security of cryptographic hash functions | | This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,Add to Reading ListSource URL: eprint.iacr.orgDownload Document from Source Website File Size: 948,91 KBShare Document on Facebook
|