Merkle Signatures with Virtually Unlimited Signature Capacity (English)
Free access
- New search for: Buchmann, Johannes
- New search for: Dahmen, Erik
- New search for: Klintsevich, Elena
- New search for: Okeya, Katsuyuki
- New search for: Vuillaume, Camille
- New search for: Buchmann, Johannes
- New search for: Dahmen, Erik
- New search for: Klintsevich, Elena
- New search for: Okeya, Katsuyuki
- New search for: Vuillaume, Camille
In:
Applied Cryptography and Network Security
1
;
31-45
;
2007
- Article/Chapter (Book) / Electronic Resource
-
Title:Merkle Signatures with Virtually Unlimited Signature Capacity
-
Contributors:Buchmann, Johannes ( author ) / Dahmen, Erik ( author ) / Klintsevich, Elena ( author ) / Okeya, Katsuyuki ( author ) / Vuillaume, Camille ( author )
-
Published in:Applied Cryptography and Network Security , 1 ; 31-45Lecture Notes in Computer Science ; 4521, 1 ; 31-45
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2007-01-01
-
Size:15 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Generic Transformation to Strongly Unforgeable SignaturesHuang, Qiong / Wong, Duncan S. / Zhao, Yiming et al. | 2007
- 18
-
Efficient Generic On-Line/Off-Line Signatures Without Key ExposureChen, Xiaofeng / Zhang, Fangguo / Susilo, Willy / Mu, Yi et al. | 2007
- 31
-
Merkle Signatures with Virtually Unlimited Signature CapacityBuchmann, Johannes / Dahmen, Erik / Klintsevich, Elena / Okeya, Katsuyuki / Vuillaume, Camille et al. | 2007
- 46
-
Midpoints Versus Endpoints: From Protocols to FirewallsBidder-Senn, Diana / Basin, David / Caronni, Germano et al. | 2007
- 65
-
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking SchemeLu, Liang / Safavi-Naini, Rei / Horton, Jeffrey / Susilo, Willy et al. | 2007
- 87
-
Analyzing an Electronic Cash Protocol Using Applied Pi CalculusLuo, Zhengqin / Cai, Xiaojuan / Pang, Jun / Deng, Yuxin et al. | 2007
- 104
-
Cryptanalysis of the TRMC-4 Public Key CryptosystemNie, Xuyun / Hu, Lei / Ding, Jintai / Li, Jianyu / Wagner, John et al. | 2007
- 116
-
Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener AttackSun, Hung-Min / Wu, Mu-En / Chen, Yao-Hsin et al. | 2007
- 129
-
A Timing Attack on Blakley’s Modular Multiplication Algorithm, and Applications to DSABakhshi, Bahador / Sadeghiyan, Babak et al. | 2007
- 141
-
Protecting AES Software Implementations on 32-Bit Processors Against Power AnalysisTillich, Stefan / Herbst, Christoph / Mangard, Stefan et al. | 2007
- 158
-
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation ComplexityNam, Junghyun / Paik, Juryon / Kim, Ung Mo / Won, Dongho et al. | 2007
- 177
-
Preventing Collusion Attacks on the One-Way Function Tree (OFT) SchemeXu, Xuxin / Wang, Lingyu / Youssef, Amr / Zhu, Bo et al. | 2007
- 194
-
Bayesian Methods for Practical Traitor TracingZigoris, Philip / Jin, Hongxia et al. | 2007
- 207
-
A New Protocol for Conditional Disclosure of Secrets and Its ApplicationsLaur, Sven / Lipmaa, Helger et al. | 2007
- 226
-
An Unconditionally Secure Protocol for Multi-Party Set IntersectionLi, Ronghua / Wu, Chuankun et al. | 2007
- 237
-
Privacy-Preserving Set UnionFrikken, Keith et al. | 2007
- 253
-
Universal Accumulators with Efficient Nonmembership ProofsLi, Jiangtao / Li, Ninghui / Xue, Rui et al. | 2007
- 270
-
Unlinkable Secret Handshakes and Key-Private Group Key Management SchemesJarecki, Stanisław / Liu, Xiaomin et al. | 2007
- 288
-
Identity-Based Proxy Re-encryptionGreen, Matthew / Ateniese, Giuseppe et al. | 2007
- 307
-
A More Natural Way to Construct Identity-Based Identification SchemesYang, Guomin / Chen, Jing / Wong, Duncan S. / Deng, Xiaotie / Wang, Dongsheng et al. | 2007
- 323
-
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash FunctionsZhang, Rui et al. | 2007
- 340
-
Certified E-Mail Protocol in the ID-Based SettingGu, Chunxiang / Zhu, Yuefei / Zheng, Yonghui et al. | 2007
- 354
-
Efficient Content Authentication in Peer-to-Peer NetworksTamassia, Roberto / Triandopoulos, Nikos et al. | 2007
- 373
-
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc NetworksLi, Fagen / Hu, Yupu / Zhang, Chuanrong et al. | 2007
- 385
-
Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key ChainsDutta, Ratna / Chang, Ee-Chien / Mukhopadhyay, Sourav et al. | 2007
- 401
-
BAP: Broadcast Authentication Using Cryptographic PuzzlesSchaller, Patrick / Čapkun, Srdjan / Basin, David et al. | 2007
- 420
-
Compressed XTRShirase, Masaaki / Han, Dong-Guk / Hibino, Yasushi / Kim, Ho Won / Takagi, Tsuyoshi et al. | 2007
- 432
-
Sliding Window Method for NTRULee, Mun-Kyu / Kim, Jung Woo / Song, Jeong Eun / Park, Kunsoo et al. | 2007
- 443
-
Efficient Certificateless Signature SchemesChoi, Kyu Young / Park, Jong Hwan / Hwang, Jung Yeon / Lee, Dong Hoon et al. | 2007
- 459
-
Security Mediated Certificateless SignaturesYap, Wun-She / Chow, Sherman S. M. / Heng, Swee-Huay / Goi, Bok-Min et al. | 2007
- 478
-
Gradually Convertible Undeniable SignaturesAimani, Laila / Vergnaud, Damien et al. | 2007