![Hashing / Search algorithms / Schnorr signature / Digital signature / Random oracle / One-way function / Universal hashing / RSA / Hash function / Cryptography / Public-key cryptography / Cryptographic hash functions Hashing / Search algorithms / Schnorr signature / Digital signature / Random oracle / One-way function / Universal hashing / RSA / Hash function / Cryptography / Public-key cryptography / Cryptographic hash functions](https://www.pdfsearch.io/img/0058672054040c86c3045ea6c3d3c96e.jpg) Date: 2002-06-27 15:00:00Hashing Search algorithms Schnorr signature Digital signature Random oracle One-way function Universal hashing RSA Hash function Cryptography Public-key cryptography Cryptographic hash functions | | Proceedings of Selected Areas in Cryptography ’98 (August 17–18, 1998, Kingston, Ontario, Canada) S. Tavares and H. Meijer Eds. Springer-Verlag, LNCS 1556, pages 72–80. Computational Alternatives to Random Number GAdd to Reading ListSource URL: www.di.ens.frDownload Document from Source Website File Size: 137,71 KBShare Document on Facebook
|