Date: 2002-06-27 15:00:00Hashing Search algorithms Schnorr signature Digital signature Random oracle One-way function Universal hashing RSA Hash function Cryptography Public-key cryptography Cryptographic hash functions | | Proceedings of Selected Areas in Cryptography ’98 (August 17–18, 1998, Kingston, Ontario, Canada) S. Tavares and H. Meijer Eds. Springer-Verlag, LNCS 1556, pages 72–80. Computational Alternatives to Random Number GAdd to Reading ListSource URL: www.di.ens.frDownload Document from Source Website File Size: 137,71 KBShare Document on Facebook
|