共 50 条
- [31] Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model SELECTED AREAS IN CRYPTOGRAPHY - SAC 2017, 2018, 10719 : 263 - 280
- [32] Poster: Signer Discretion is Advised: On the Insecurity of Vitalik's Threshold Hash-based Signatures PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3597 - 3599
- [34] Hash-Based Key Management Schemes for MPEG4-FGS INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 245 - 256
- [35] HASH-BASED ALGORITHMS FOR DISCRETIZED DATA SIAM JOURNAL ON SCIENTIFIC COMPUTING, 2013, 35 (04): : C346 - C368
- [36] Global Optimization for Hash-based Splitting 2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
- [37] A Hash-Based Public Key Cryptosystem CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 383 - 392
- [38] Hash-Based Direct Anonymous Attestation POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2023, 2023, 14154 : 565 - 600
- [39] Hash-based dynamic source routing NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 1012 - 1023
- [40] Hash-based Structural Join algorithms CURRENT TRENDS IN DATABASE TECHNOLOGY - EDBT 2006, 2006, 4254 : 136 - 149