<--- Back to Details
First PageDocument Content
Hashing / Error detection and correction / Digital signature / Hash tree / SHA-2 / SHA-1 / RSA / Hash function / Merkle signature scheme / Cryptography / Cryptographic hash functions / Public-key cryptography
Date: 2005-12-02 02:25:54
Hashing
Error detection and correction
Digital signature
Hash tree
SHA-2
SHA-1
RSA
Hash function
Merkle signature scheme
Cryptography
Cryptographic hash functions
Public-key cryptography

One-Time Signatures Revisited: Have They Become Practical? Dalit Naor∗ Amir Shenhav† Avishai Wool‡

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 208,92 KB

Share Document on Facebook

Similar Documents

Cooperative XPath Caching Kostas Lillis and Evaggelia Pitoura Computer Science Department University of Ioannina, Greece {klillis,

Cooperative XPath Caching Kostas Lillis and Evaggelia Pitoura Computer Science Department University of Ioannina, Greece {klillis,

DocID: 1rqvV - View Document

The Architecture of PIER: an Internet-Scale Query Processor Ryan Huebsch, Brent Chun, Joseph M. Hellerstein, Boon Thau Loo, Petros Maniatis, Timothy Roscoe, Scott Shenker, Ion Stoica and Aydan R. Yumerefendi UC Berkeley

The Architecture of PIER: an Internet-Scale Query Processor Ryan Huebsch, Brent Chun, Joseph M. Hellerstein, Boon Thau Loo, Petros Maniatis, Timothy Roscoe, Scott Shenker, Ion Stoica and Aydan R. Yumerefendi UC Berkeley

DocID: 1r0TY - View Document

Microsoft Word - article4.doc

Microsoft Word - article4.doc

DocID: 1qZW6 - View Document

BATON: A Balanced Tree Structure for Peer-to-Peer Networks H.V. Jagadish 1,2

BATON: A Balanced Tree Structure for Peer-to-Peer Networks H.V. Jagadish 1,2

DocID: 1qq4a - View Document

1242  IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 17,

1242 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 17,

DocID: 1qadb - View Document