<--- Back to Details
First PageDocument Content
Cryptography / Hashing / Search algorithms / Cryptographic hash functions / Error detection and correction / Hash function / Digital signature / Collision resistance / Hash / Trapdoor function / Security of cryptographic hash functions
Date: 2017-12-13 06:49:27
Cryptography
Hashing
Search algorithms
Cryptographic hash functions
Error detection and correction
Hash function
Digital signature
Collision resistance
Hash
Trapdoor function
Security of cryptographic hash functions

This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 948,91 KB

Share Document on Facebook

Similar Documents

New Generic Attacks Against Hash-based MACs Ga¨etan Leurent1 , Thomas Peyrin2 , and Lei Wang2 1 Universit´e Catholique de Louvain, Belgium

New Generic Attacks Against Hash-based MACs Ga¨etan Leurent1 , Thomas Peyrin2 , and Lei Wang2 1 Universit´e Catholique de Louvain, Belgium

DocID: 1xVPJ - View Document

Hash-based signatures Joost Rijneveld  Radboud University, Nijmegen, The Netherlands  Post-quantum cryptography

Hash-based signatures Joost Rijneveld Radboud University, Nijmegen, The Netherlands Post-quantum cryptography

DocID: 1xVpf - View Document

Hash-Based Signatures  Stefan-Lukas Gazdag <Stefan-Lukas > 5th ENISA/FORTH Summer School, 27th of September 2018

Hash-Based Signatures Stefan-Lukas Gazdag 5th ENISA/FORTH Summer School, 27th of September 2018

DocID: 1xVpd - View Document

Comments Received in Response to:  Request for Comments on Draft Revision of the Applicability Clause of FIPS 180-4, Secure Hash Standard

Comments Received in Response to: Request for Comments on Draft Revision of the Applicability Clause of FIPS 180-4, Secure Hash Standard

DocID: 1xVjQ - View Document

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1  Netherlands National Communication Security Agency (NLNCSA)

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1 Netherlands National Communication Security Agency (NLNCSA)

DocID: 1xV0o - View Document