Analysis of client-side security for long-term time-stamping services
From MaRDI portal
Publication:2117024
DOI10.1007/978-3-030-78372-3_2zbMATH Open1489.68048OpenAlexW3168787638MaRDI QIDQ2117024FDOQ2117024
Publication date: 21 March 2022
Full work available at URL: https://zenodo.org/record/5546769
Recommendations
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Salvaging Merkle-Damgård for Practical Applications
- How to Time-Stamp a Digital Document
- Title not available (Why is that?)
- On Provably Secure Time-Stamping Schemes
- Long-term secure time-stamping using preimage-aware hash functions (short version)
- Knowledge-Binding Commitments with Applications in Time-Stamping
- An introduction to number theory with cryptography
- Does Secure Time-Stamping Imply Collision-Free Hash Functions?
- Modeling Computational Security in Long-Lived Systems
- Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?
- Applied Cryptography and Network Security
This page was built for publication: Analysis of client-side security for long-term time-stamping services
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2117024)