Merkle Tree Traversal Revisited (English)
- New search for: Buchmann, Johannes
- New search for: Dahmen, Erik
- New search for: Schneider, Michael
- New search for: Buchmann, Johannes
- New search for: Dahmen, Erik
- New search for: Schneider, Michael
In:
Post-Quantum Cryptography
;
63-78
;
2008
- Article/Chapter (Book) / Electronic Resource
-
Title:Merkle Tree Traversal Revisited
-
Contributors:
-
Published in:Post-Quantum Cryptography ; 63-78Lecture Notes in Computer Science ; 5299 ; 63-78
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2008-01-01
-
Size:16 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
A New Efficient Threshold Ring Signature Scheme Based on Coding TheoryAguilar Melchor, Carlos / Cayrel, Pierre-Louis / Gaborit, Philippe et al. | 2008
- 17
-
Square-Vinegar Signature SchemeBaena, John / Clough, Crystal / Ding, Jintai et al. | 2008
- 31
-
Attacking and Defending the McEliece CryptosystemBernstein, Daniel J. / Lange, Tanja / Peters, Christiane et al. | 2008
- 47
-
McEliece Cryptosystem Implementation: Theory and PracticeBiswas, Bhaskar / Sendrier, Nicolas et al. | 2008
- 63
-
Merkle Tree Traversal RevisitedBuchmann, Johannes / Dahmen, Erik / Schneider, Michael et al. | 2008
- 79
-
Explicit Hard Instances of the Shortest Vector ProblemBuchmann, Johannes / Lindner, Richard / Rückert, Markus et al. | 2008
- 95
-
Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ℓIC-DerivativesChen, Anna Inn-Tung / Chen, Chia-Hsin Owen / Chen, Ming-Shing / Cheng, Chen-Mou / Yang, Bo-Yin et al. | 2008
- 109
-
Digital Signatures Out of Second-Preimage Resistant Hash FunctionsDahmen, Erik / Okeya, Katsuyuki / Takagi, Tsuyoshi / Vuillaume, Camille et al. | 2008
- 124
-
Cryptanalysis of Rational Multivariate Public Key CryptosystemsDing, Jintai / Wagner, John et al. | 2008
- 137
-
Syndrome Based Collision Resistant HashingFiniasz, Matthieu et al. | 2008
- 148
-
Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key CryptosystemsFujita, Ryou / Tadaki, Kohtaro / Tsujii, Shigeo et al. | 2008
- 165
-
On the Power of Quantum Encryption KeysKawachi, Akinori / Portmann, Christopher et al. | 2008
- 181
-
Secure PRNGs from Specialized Polynomial Maps over Any $\mathbb{F}_{q}$Liu, Feng-Hao / Lu, Chi-Jen / Yang, Bo-Yin et al. | 2008
- 203
-
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant StrategyMohamed, Mohamed Saied Emam / Mohamed, Wael Said Abd Elmageed / Ding, Jintai / Buchmann, Johannes et al. | 2008
- 216
-
Side Channels in the McEliece PKCStrenzke, Falko / Tews, Erik / Molter, H. Gregor / Overbeck, Raphael / Shoufan, Abdulhadi et al. | 2008