On the Security of the Winternitz One-Time Signature Scheme (English)
- New search for: Buchmann, Johannes
- New search for: Dahmen, Erik
- New search for: Ereth, Sarah
- New search for: Hülsing, Andreas
- New search for: Rückert, Markus
- New search for: Buchmann, Johannes
- New search for: Dahmen, Erik
- New search for: Ereth, Sarah
- New search for: Hülsing, Andreas
- New search for: Rückert, Markus
In:
Progress in Cryptology – AFRICACRYPT 2011
9
;
363-378
;
2011
- Article/Chapter (Book) / Electronic Resource
-
Title:On the Security of the Winternitz One-Time Signature Scheme
-
Contributors:Buchmann, Johannes ( author ) / Dahmen, Erik ( author ) / Ereth, Sarah ( author ) / Hülsing, Andreas ( author ) / Rückert, Markus ( author )
-
Published in:Progress in Cryptology – AFRICACRYPT 2011 , 9 ; 363-378Lecture Notes in Computer Science ; 6737, 9 ; 363-378
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2011-01-01
-
Size:16 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Secure Outsourced ComputationLoftus, Jake / Smart, Nigel P. et al. | 2011
- 21
-
Fully Simulatable Quantum-Secure Coin-Flipping and ApplicationsLunemann, Carolin / Nielsen, Jesper Buus et al. | 2011
- 41
-
Efficient and Secure Generalized Pattern Matching via Fast Fourier TransformVergnaud, Damien et al. | 2011
- 59
-
Identification Schemes from Key Encapsulation MechanismsAnada, Hiroaki / Arita, Seiko et al. | 2011
- 77
-
Attacking Bivium and Trivium with the Characteristic Set MethodHuang, Zhenyu / Lin, Dongdai et al. | 2011
- 92
-
Improved Cryptanalysis of the Multi-Prime φ - Hiding AssumptionHerrmann, Mathias et al. | 2011
- 100
-
FPGA Implementation of a Statistical Saturation Attack against PRESENTKerckhof, Stéphanie / Collard, Baudoin / Standaert, Franc̨ois-Xavier et al. | 2011
- 117
-
Collisions of MMO-MD5 and Their Impact on Original MD5Sasaki, Yu et al. | 2011
- 134
-
Really Fast Syndrome-Based HashingBernstein, Daniel J. / Lange, Tanja / Peters, Christiane / Schwabe, Peter et al. | 2011
- 153
-
Montgomery’s Trick and Fast Implementation of Masked AESGenelle, Laurie / Prouff, Emmanuel / Quisquater, Michaël et al. | 2011
- 170
-
Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate RepresentationHutter, Michael / Joye, Marc / Sierra, Yannick et al. | 2011
- 188
-
Efficient Multiplication in Finite Field Extensions of Degree 5Mrabet, Nadia / Guillevic, Aurore / Ionica, Sorina et al. | 2011
- 206
-
Achieving Optimal Anonymity in Transferable E-Cash with a JudgeBlazy, Olivier / Canard, Sébastien / Fuchsbauer, Georg / Gouget, Aline / Sibert, Hervé / Traoré, Jacques et al. | 2011
- 224
-
Revocable Attribute-Based Signatures with Adaptive Security in the Standard ModelEscala, Alex / Herranz, Javier / Morillo, Paz et al. | 2011
- 242
-
Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic DesignArmknecht, Frederik / Elsner, Carsten / Schmidt, Martin et al. | 2011
- 260
-
Analyzing Standards for RSA IntegersLoebenberger, Daniel / Nüsken, Michael et al. | 2011
- 278
-
Hashing into Hessian CurvesFarashahi, Reza Rezaeian et al. | 2011
- 290
-
On Randomness Extraction in Elliptic CurvesCiss, Abdoul Aziz / Sow, Djiby et al. | 2011
- 298
-
Fault Analysis of Grain-128 by Targeting NFSRKarmakar, Sandip / Roy Chowdhury, Dipanwita et al. | 2011
- 316
-
Differential Fault Analysis of SosemanukEsmaeili Salehani, Yaser / Kircanski, Aleksandar / Youssef, Amr et al. | 2011
- 332
-
An Improved Differential Fault Analysis on AES-256Ali, Subidh / Mukhopadhyay, Debdeep et al. | 2011
- 348
-
Benaloh’s Dense Probabilistic Encryption RevisitedFousse, Laurent / Lafourcade, Pascal / Alnuaimi, Mohamed et al. | 2011
- 363
-
On the Security of the Winternitz One-Time Signature SchemeBuchmann, Johannes / Dahmen, Erik / Ereth, Sarah / Hülsing, Andreas / Rückert, Markus et al. | 2011
- 379
-
Efficient Zero-Knowledge ProofsGroth, Jens et al. | 2011
- 380
-
Some Key Techniques on Pairing Vector SpacesOkamoto, Tatsuaki / Takashima, Katsuyuki et al. | 2011
- 383
-
The NIST SHA-3 Competition: A Perspective on the Final YearPreneel, Bart et al. | 2011