Digital Signatures Out of Second-Preimage Resistant Hash Functions
From MaRDI portal
Publication:3535355
Recommendations
Cites work
- scientific article; zbMATH DE number 1088254 (Why is no real title available?)
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- A composition theorem for universal one-way hash functions
- Advances in Cryptology - EUROCRYPT 2004
- Cryptography and Coding
- Fast Software Encryption
- Finding Collisions in the Full SHA-1
- How to Break MD5 and Other Hash Functions
- Strengthening Digital Signatures Via Randomized Hashing
Cited in
(12)- WOTS-S: a quantum secure compact signature scheme for distributed ledger
- Public Key Authentication with Memory Tokens
- On the security of the Winternitz one-time signature scheme
- W-OTS\textsuperscript{+} up my sleeve! A hidden secure fallback for cryptocurrency wallets
- Characterizing collision and second-preimage resistance in Linicrypt
- Bounded Pre-image Awareness and the Security of Hash-Tree Keyless Signatures
- Batch signatures, revisited
- An intermediate secret-guessing attack on hash-based signatures
- XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions
- Tweakable $$\mathcal {S}_{\text{ leeve }}$$: A Novel $$\mathcal {S}_{\text{ leeve }}$$ Construction Based on Tweakable Hash Functions
- WOTSwana: a generalized \(\mathcal{S}_{\mathrm{ leeve }}\) construction for multiple proofs of ownership
- LMS vs XMSS: comparison of stateful hash-based signature schemes on ARM Cortex-M4
This page was built for publication: Digital Signatures Out of Second-Preimage Resistant Hash Functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3535355)