DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Lamport signature
Lamport signature
On the Efficiency of the Lamport Signature Scheme
Outline One-Time Signatures One-Time Signatures Lamport's
A Survey on Post-Quantum Cryptography for Constrained Devices
Applications of SKREM-Like Symmetric Key Ciphers
Speeding-Up Verification of Digital Signatures Abdul Rahman Taleb, Damien Vergnaud
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World∗
Lecture 17 March 28, 2019
Lecture 17 November 1, 2017
The Impact of Quantum Computing on Present Cryptography
Using Hash-Based Signatures to Bootstrap Quantum Key Distribution
Quantum Resistant Public Key Cryptography: a Survey
Faster and Shorter Password-Authenticated Key Exchange
Simpira V2: a Family of Efficient Permutations Using the AES Round
Signature Schemes in Single and Multi-User Settings
Secure Implementation of ECDSA Signatures in Bitcoin
Efficient Architecture and Implementation for NTRU Based
Security of Cryptographic Tasks
View the Index
Top View
If There Is a Single Security Hole in a Cryptosystem, the Part I Exposure of a Cryptosystem Will Make Sure That Someone Will Eventually find It
Provably Unforgeable Signatures Jujen N.E.Bos' David Chaurnt
Code-Based Post-Quantum Cryptography
Postquantum Cryptography
Comments in 2012 About the 1979 Paper: a Certified Digital Signature
Quantum Digital Signatures Could Be Used to Sign Contracts That Similar Efficiency Could Be Achieved Here
Secure Hardware Implementation of Post Quantum Cryptosystems
A New Quantum Blind Signature Scheme with BB84-State
Efficient Quantum-Immune Keyless Signatures with Identity
Digital Signatures Are One of the Most Important Inventions/Applications of Modern Cryptography
Post-Quantum Cryptography – Dealing with the Fallout of Physics Success
The Quantum World
Introduction to Provable Security in Public-Key Cryptography Contents
Post-Quantum Cryptography Standardization Helen Tera Supervised by Dominique Unruh University of Tartu
(Merkle-Damgård). 2푛 푛 Let 퐊퐞퐲퐆퐞퐧H, ℋ Be a Hash Function, and Suppose ℋ: 0,1 → 0,1
Implementation of Cryptosystem Based on Error-Correcting Codes
Multi-Party Electronic Payments for Mobile Communications
9 Digital Signatures: Definition and First Constructions
Making Bitcoin Quantum Resistant
Quantum Safe Cryptography Based on Hash Functions: a Survey
Digital Signatures Are One of the Most Important Inventions/Applications of Modern Cryptography
A Comparative Study on Signature Schemes for Iot Devices