First Page | Document Content | |
---|---|---|
Date: 2018-07-10 06:41:12Cryptography Public-key cryptography Post-quantum cryptography Hash-based cryptography Hashing Merkle signature scheme Digital signature Merkle tree Cryptographic hash function RSA Hash function Quantum digital signature | Practical Fault Injection Attacks on SPHINCS Aymeric Genêt1,2 , Matthias J. Kannwischer3 , Hervé Pelletier2 , and Andrew McLauchlan2 ? 1 3Add to Reading ListSource URL: kannwischer.euDownload Document from Source WebsiteFile Size: 827,18 KBShare Document on Facebook |
Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University Adrian PerrigDocID: 1phYN - View Document | |
Microsoft Word - Indo-US-Workshop-jaja.docDocID: 1oUI6 - View Document | |
SPV: Secure Path Vector Routing for Securing BGP ∗ Yih-Chun Hu Adrian PerrigDocID: 1oDfz - View Document | |
Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow onlineDocID: 1ov99 - View Document | |
The Future of Massively Distributed Services on the Internet Mark Hapner Sun MicrosystemsDocID: 1otZ9 - View Document |