<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Post-quantum cryptography / Smart cards / Hash-based cryptography / Digital signature / Cryptographic hash function / Java Card / Hash function / Security token / Cryptographic primitive / XMSS
Date: 2018-10-07 06:08:08
Cryptography
Public-key cryptography
Post-quantum cryptography
Smart cards
Hash-based cryptography
Digital signature
Cryptographic hash function
Java Card
Hash function
Security token
Cryptographic primitive
XMSS

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1 Netherlands National Communication Security Agency (NLNCSA)

Add to Reading List

Source URL: cryptojedi.org

Download Document from Source Website

File Size: 449,84 KB

Share Document on Facebook

Similar Documents

Cryptography / Multivariate cryptography / Finite fields / Post-quantum cryptography / Hidden Field Equations / Unbalanced Oil and Vinegar / Trapdoor function / XTR / QUAD / Mutation / Digital signature

-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography Jintai Ding1, , Christopher Wolf2 , and Bo-Yin Yang3, 1 University of Cincinnati and Technische Universität Darmstadt

DocID: 1xVV9 - View Document

Cryptography / Post-quantum cryptography / Multivariate cryptography / Finite fields / Lattice-based cryptography / Hidden Field Equations / Learning with errors / QUAD / RSA / Reduction / Computational hardness assumption / Ideal lattice cryptography

Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3

DocID: 1xVNp - View Document

Cryptography / Computational complexity theory / Theory of computation / Randomized algorithms / Complexity classes / Zero-knowledge proof / Interactive proof system / Quantum complexity theory / NP / IP / Soundness / Computational indistinguishability

ECE/CS498: Applied Cryptography Instructor: Andrew Miller, TA: Kevin Liao Lecture 2: Interactive Proofs 1

DocID: 1xVMd - View Document

Cryptography / Proof theory / Computational complexity theory / Zero-knowledge proof / Complexity classes / Soundness / IP / Zero knowledge / Interactive proof system / PSPACE / Mathematical proof / Proof of knowledge

The Art of Cryptography Zero Knowledge Proofs Abhiram Kothapalli Two Balls and the Color-Blind Friend

DocID: 1xVLd - View Document

Cryptography / Multivariate cryptography / Post-quantum cryptography / Algebra / Polynomials / Unbalanced Oil and Vinegar / Hidden Field Equations / Algebraic equation / QUAD / Variable / Equation / Finite field

Multivariate Cryptography Louis Goubin, Versailles St-Quentin-en-Yvelines University, France, Jacques Patarin, Versailles St-Quentin-en-Yvelines University, France, and Bo-Yin Yang, Institute of Information Science, Acad

DocID: 1xVDQ - View Document