scientific article

From MaRDI portal
Publication:3342347

zbMath0549.94022MaRDI QIDQ3342347

Ralph C. Merkle

Publication date: 1982


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (31)

Confidential and efficient asset proof for bitcoin exchangesConstruction of one-way hash functions with increased key space using adaptive chaotic mapsCollapseability of Tree HashesAn intermediate secret-guessing attack on hash-based signaturesUnintended features of APIs: cryptanalysis of incremental HMACStatic-memory-hard functions, and modeling the cost of space vs. timeDynamic Provable Data Possession Protocols with Public Verifiability and Data PrivacyOptimal trade-off for Merkle tree traversalSecurity analysis of randomize-hash-then-sign digital signaturesOpen problems in hash function securityMerkle tree ladder mode: reducing the size impact of NIST PQC signature algorithms in practiceOn time-space tradeoffs for bounded-length collisions in Merkle-Damgård hashingThe universality of iterated hashing over variable-length stringsSecurity of truncated permutation without initial valueOn time-space tradeoffs for bounded-length collisions in Merkle-Damgård hashingTime-space tradeoffs for sponge hashing: attacks and limitations for short collisionsBreaking category five \(\mathrm{SPHINCS}^+\) with SHA-256The hunting of the SNARKNew Techniques for Cryptanalysis of Hash Functions and Improved Attacks on SnefruBounded-Retrieval Model with Keys Derived from Private DataPublic key compression for constrained linear signature schemesSimple hash function using discrete-time quantum walksPost-Quantum Cryptography: State of the ArtAn Efficient Post-Quantum One-Time Signature SchemeA Data Concealing Technique with Random Noise Disturbance and a Restoring Technique for the Concealed Data by Stochastic Process EstimationEfficient Algorithms for Supersingular Isogeny Diffie-HellmanBlockchain technology: issues of analysis and synthesisHash function based on quantum walksNew records of pre-image search of reduced SHA-1 using SAT solversOn the Security of Compressed EncodingsA Subexponential-Time Algorithm for Computing Discrete Logarithms over GF(p 2)




This page was built for publication: