First Page | Document Content | |
---|---|---|
Date: 2018-10-15 10:31:49Cryptography Public-key cryptography Post-quantum cryptography Hash-based cryptography Hashing Merkle signature scheme Digital signature Cryptographic hash function Merkle tree RSA Hash function Quantum digital signature | Practical Fault Injection Attacks on SPHINCS Aymeric Genêt1,2 , Matthias J. Kannwischer3 , Hervé Pelletier2 , and Andrew McLauchlan2 ? 1 EPFL, Lausanne, SwitzerlandAdd to Reading ListSource URL: kannwischer.euDownload Document from Source WebsiteFile Size: 827,79 KBShare Document on Facebook |
State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1 Cisco Systems, USADocID: 1oY9c - View Document | |
draft-irtf-cfrg-xmss-hash-based-signatures-00 - XMSS: Extended Hash-Based SignaturesDocID: 1aZWa - View Document | |
Defending against Sybil Attacks in Sensor Networks∗ Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning Cyber Defense Laboratory, Computer Science Department North Carolina State University, Raleigh, NC {qDocID: 17XFn - View Document | |
PDF DocumentDocID: 17em7 - View Document |