Optimal Parameters for XMSS MT (English)
Free access
- New search for: Hülsing, Andreas
- New search for: Rausch, Lea
- New search for: Buchmann, Johannes
- New search for: Hülsing, Andreas
- New search for: Rausch, Lea
- New search for: Buchmann, Johannes
In:
Security Engineering and Intelligence Informatics
2
;
194-208
;
2013
- Article/Chapter (Book) / Electronic Resource
-
Title:Optimal Parameters for XMSS MT
-
Contributors:
-
Published in:Security Engineering and Intelligence Informatics , 2 ; 194-208Lecture Notes in Computer Science ; 8128, 2 ; 194-208
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2013-01-01
-
Size:15 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Differential Cryptanalysis and Boomerang Cryptanalysis of LBlockChen, Jiageng / Miyaji, Atsuko et al. | 2013
- 16
-
Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and ConstructionsKubai, Asato / Shikata, Junji / Watanabe, Yohei et al. | 2013
- 29
-
On Constructions of MDS Matrices from Companion Matrices for Lightweight CryptographyGupta, Kishan Chand / Ray, Indranil Ghosh et al. | 2013
- 44
-
Code-Based Public-Key Encryption Resistant to Key LeakagePersichetti, Edoardo et al. | 2013
- 55
-
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to BiometricsYasuda, Masaya / Shimoyama, Takeshi / Kogure, Jun / Yokoyama, Kazuhiro / Koshiba, Takeshi et al. | 2013
- 75
-
A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory ImagesKamal, Abdel Alim / Zahno, Roger / Youssef, Amr M. et al. | 2013
- 91
-
Cryptanalysis of 2-Layer Nonlinear Piece in Hand MethodNie, Xuyun / Petzoldt, Albrecht / Buchmann, Johannes et al. | 2013
- 105
-
On the Security of LBlock against the Cube Attack and Side Channel Cube AttackIslam, Saad / Afzal, Mehreen / Rashdi, Adnan et al. | 2013
- 122
-
Code-Based Identification and Signature Schemes in SoftwareYousfi Alaoui, Sidi Mohamed / Cayrel, Pierre-Louis / Bansarkhani, Rachid / Hoffmann, Gerhard et al. | 2013
- 137
-
Fast Software Polynomial Multiplication on ARM Processors Using the NEON EngineCâmara, Danilo / Gouvêa, Conrado P. L. / López, Julio / Dahab, Ricardo et al. | 2013
- 155
-
Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff CurvesGsenger, Gerwin / Hanser, Christian et al. | 2013
- 168
-
Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz CurvesHanser, Christian / Wagner, Christian et al. | 2013
- 180
-
Cumulus4j: A Provably Secure Database Abstraction LayerHuber, Matthias / Gabel, Matthias / Schulze, Marco / Bieber, Alexander et al. | 2013
- 194
-
Optimal Parameters for XMSS MTHülsing, Andreas / Rausch, Lea / Buchmann, Johannes et al. | 2013
- 209
-
Solving the Discrete Logarithm Problem for Packing Candidate PreferencesHeather, James / Culnane, Chris / Schneider, Steve / Srinivasan, Sriramkrishnan / Xia, Zhe et al. | 2013
- 222
-
SPA on MIST Exponentiation Algorithm with Multiple Computational SequencesChen, Chien-Ning / Tu, Jheng-Hong / Yen, Sung-Ming et al. | 2013
- 236
-
Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in CyberspaceColombini, Clara Maria / Colella, Antonio / Mattiucci, Marco / Castiglione, Aniello et al. | 2013
- 253
-
Analyzing the Internet Stability in Presence of DisastersPalmieri, Francesco / Fiore, Ugo / Castiglione, Aniello / Leu, Fang-Yie / Santis, Alfredo et al. | 2013
- 269
-
Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid’5000 ProjectSchaberreiter, Thomas / Varrette, Sébastien / Bouvry, Pascal / Röning, Juha / Khadraoui, Djamel et al. | 2013
- 288
-
How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime FunctionBoehmer, Wolfgang et al. | 2013
- 305
-
Using Probabilistic Analysis for the Certification of Machine Control SystemsMashkoor, Atif / Hasan, Osman / Beer, Wolfgang et al. | 2013
- 321
-
Experimental Investigation in the Impact on Security of the Release Order of Defensive AlgorithmsAlsuhibany, Suliman A. / Alonaizi, Ahmad / Morisset, Charles / Smith, Chris / Moorsel, Aad et al. | 2013
- 337
-
A Multiple-Key Management Scheme in Wireless Sensor NetworksLiu, Jung-Chun / Huang, Yi-Li / Leu, Fang-Yie / You, Ilsun / Chiang, Feng-Ching / Yang, Chao-Tung / Chu, William Cheng-Chung et al. | 2013
- 345
-
VisSecAnalyzer: A Visual Analytics Tool for Network Security AssessmentKotenko, Igor / Novikova, Evgenia et al. | 2013
- 361
-
A Denial of Service Attack to GSM Networks via Attach ProcedureGobbo, Nicola / Merlo, Alessio / Migliardi, Mauro et al. | 2013
- 377
-
PPM: Privacy Policy Manager for Personalized ServicesKiyomoto, Shinsaku / Nakamura, Toru / Takasaki, Haruo / Watanabe, Ryu / Miyake, Yutaka et al. | 2013
- 393
-
An Attribute Based Private Data Sharing Scheme for People-Centric Sensing NetworksLiu, Bo / Zhao, Baokang / Wu, Chunqing et al. | 2013
- 408
-
Intelligent UBMSS Systems for Strategic Information ManagementOgiela, Lidia / Ogiela, Marek R. et al. | 2013
- 414
-
Fully Distributed Secure Video Surveillance Via Portable Device with User AwarenessCastiglione, Arcangelo / D’Ambrosio, Ciriaco / Santis, Alfredo / Palmieri, Francesco et al. | 2013
- 430
-
Computer Karate Trainer in Tasks of Personal and Homeland Security DefenseHachaj, Tomasz / Ogiela, Marek R. et al. | 2013
- 442
-
Trustworthiness Evaluation of Multi-sensor Situation Recognition in Transit Surveillance ScenariosFlammini, Francesco / Marrone, Stefano / Mazzocca, Nicola / Pappalardo, Alfio / Pragliola, Concetta / Vittorini, Valeria et al. | 2013
- 457
-
A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development ProcessPatu, Vaise / Yamamoto, Shuichiro et al. | 2013