-
1
-
-
84869251812
-
-
J. Buchmann, C. Coronado, M. Döring, D. Engelbert, C. Ludwig, R. Overbeck, A. Schmidt, U. Vollmer, and R. P. Weinmann. Post-quantum signatures. eprint: http://eprint.iacr.org/2004/297.pdf, 2004.
-
J. Buchmann, C. Coronado, M. Döring, D. Engelbert, C. Ludwig, R. Overbeck, A. Schmidt, U. Vollmer, and R. P. Weinmann. Post-quantum signatures. eprint: http://eprint.iacr.org/2004/297.pdf, 2004.
-
-
-
-
2
-
-
85007027185
-
Cmss - an improved merkle signature scheme
-
J. Buchmann, L. C. C. Garcia, E. Dahmen, M. Döring, and E. Klintsevich. Cmss - an improved merkle signature scheme. Progress in Cryptology - Indocrypt 2006, pages 349-363, 2006.
-
(2006)
Progress in Cryptology - Indocrypt 2006
, pp. 349-363
-
-
Buchmann, J.1
Garcia, L.C.C.2
Dahmen, E.3
Döring, M.4
Klintsevich, E.5
-
3
-
-
33646825997
-
Hash based digital signature schemes
-
C. Dods, N. Smart, and M. Stam. Hash based digital signature schemes. Cryptography and Coding, LNCS, 3796:96-115, 2005.
-
(2005)
Cryptography and Coding, LNCS
, vol.3796
, pp. 96-115
-
-
Dods, C.1
Smart, N.2
Stam, M.3
-
4
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
E. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms. Advances in Cryptology - CRYPTO '84, pages 10-18, 1985.
-
(1985)
Advances in Cryptology - CRYPTO '84
, pp. 10-18
-
-
Elgamal, E.1
-
6
-
-
0003735739
-
The elliptic curve digital signature algorithm (ecdsa)
-
99-34, University of Waterloo
-
D. Johnson and A. Menezes. The elliptic curve digital signature algorithm (ecdsa). Technical Report CORR 99-34, University of Waterloo, 1999.
-
(1999)
Technical Report CORR
-
-
Johnson, D.1
Menezes, A.2
-
8
-
-
62349112108
-
-
CRC, auflage edition, August
-
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstoe. Handbook of Applied Cryptography. Number 0-8493-8523-7. CRC, 5. auflage edition, August 2001.
-
(2001)
Handbook of Applied Cryptography
, Issue.0 -8493-8523-7
, pp. 5
-
-
Menezes, A.J.1
van Oorschot, P.C.2
Vanstoe, S.A.3
-
10
-
-
0003396988
-
Maintaining balanced key trees for secure multicast
-
Internet-draft, December
-
M. J. Moyer, J. R. Rao, and P. Rohatgi. Maintaining balanced key trees for secure multicast. IRTF Internet-draft, December 1999.
-
(1999)
IRTF
-
-
Moyer, M.J.1
Rao, J.R.2
Rohatgi, P.3
-
11
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
13
-
-
85115374351
-
Algorithms for quantum computation: Discrete logarithms and factoring
-
P. W. Shor. Algorithms for quantum computation: Discrete logarithms and factoring. Symposium on Foundations of Computer Science, 1994.
-
(1994)
Symposium on Foundations of Computer Science
-
-
Shor, P.W.1
-
14
-
-
62349092534
-
High-flexibility rekey-ing processor for key management in secure multicast
-
Niagara Falls, Canada, Mai
-
A. Shoufan, R. Laue, and S. A. Huss. High-flexibility rekey-ing processor for key management in secure multicast. IEEE Int. Symposium on Embedded Computing SEC-07, Niagara Falls, Canada, Mai 2007.
-
(2007)
IEEE Int. Symposium on Embedded Computing SEC-07
-
-
Shoufan, A.1
Laue, R.2
Huss, S.A.3
-
15
-
-
35048813651
-
Merkle tree traversal in log space and time
-
Advances in Cryptology, EUROCRYPT 2004
-
M. Szydlo. Merkle tree traversal in log space and time. Advances in Cryptology - EUROCRYPT 2004, LNCS, 3027:541-554, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 541-554
-
-
Szydlo, M.1
|