Analysis of client-side security for long-term time-stamping services
From MaRDI portal
Publication:2117024
Recommendations
Cites work
- scientific article; zbMATH DE number 1256737 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- scientific article; zbMATH DE number 826064 (Why is no real title available?)
- An introduction to number theory with cryptography
- Applied Cryptography and Network Security
- Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?
- Does Secure Time-Stamping Imply Collision-Free Hash Functions?
- How to Time-Stamp a Digital Document
- Knowledge-Binding Commitments with Applications in Time-Stamping
- Long-term secure time-stamping using preimage-aware hash functions (short version)
- Modeling Computational Security in Long-Lived Systems
- On Provably Secure Time-Stamping Schemes
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Salvaging Merkle-Damgård for Practical Applications
This page was built for publication: Analysis of client-side security for long-term time-stamping services
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2117024)