Author:
Kalach Kassem,Safavi-Naini Reihaneh
Publisher
Springer International Publishing
Reference48 articles.
1. Lecture Notes in Computer Science;M Abdalla,2000
2. Lecture Notes in Computer Science;M Bellare,2007
3. Bicakci, K., Tung, B., Tsudik, G.: How to construct optimal one-time signatures. J. Comput. Netw. 43(3), 339–349 (2003)
4. Lecture Notes in Computer Science;D Bleichenbacher,1994
5. Lecture Notes in Computer Science;D Bleichenbacher,1996
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Man-in-the-Middle Attack Mitigation in IoT Sensors with Hash Based Multidimensional Lamport Digital Signature;Lecture Notes in Electrical Engineering;2023
2. An Intermediate Secret-Guessing Attack on Hash-Based Signatures;Advances in Information and Computer Security;2021
3. K2SN-MSS;Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security;2019-07-02
4. Fast Authentication from Aggregate Signatures with Improved Security;Financial Cryptography and Data Security;2019