Publisher
Springer Berlin Heidelberg
Reference24 articles.
1. Buchmann, J., Dahmen, E., Ereth, S., Hülsing, A., Rückert, M.: On the security of the Winternitz one-time signature scheme. Int. J. Appl. Crypt. 3(1), 84–96 (2013)
2. Lecture Notes in Computer Science;JW Bos,2011
3. Lecture Notes in Computer Science;D Coppersmith,2003
4. Goyal, V.: How to re-initialize a hash chain. eprint.iacr.org/2004/097
5. Applications, and Tools;J Grimm,1996
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. LOKI-2: An Improved Lightweight Cryptographic Key Distribution Protocol for Automotive Systems;2023 IEEE 19th International Conference on Intelligent Computer Communication and Processing (ICCP);2023-10-26
2. A Server-Assisted Hash-Based Signature Scheme;Secure IT Systems;2017