Accesso libero

On the Efficiency of the Lamport Signature Scheme

   | 22 set 2020
INFORMAZIONI SU QUESTO ARTICOLO

Cita

Bernstein, D.J. (2009). Introduction to post-quantum cryptography. In Bernstein, D. J., Buchmann, J., & Dahmen, E. (Eds), Post-Quantum Cryptography. Berlin, Heidelberg: Springer.10.1007/978-3-540-88702-7Search in Google Scholar

Katz, J. & Lindell, Y. (2007). Introduction to Modern Cryptography. Chapman & Hall/Crc Cryptography and Network Security Series.10.1201/9781420010756Search in Google Scholar

Lamport, L. (1979). Constructing digital signatures from a one-way function. Technical Report SRI-CSL-98, SRI International Computer Science Laboratory.Search in Google Scholar

Merkle, R.C. (1988). A Digital Signature Based on a Conventional Encryption Function. Advances in Cryptology – CRYPTO ’87. Lecture Notes in Computer Science. Vol. 293, 369-378.Search in Google Scholar

National Institute of Standards and Technology. (1994). Digital Signature Standard (DSS). Federal Information Processing Standards Publication.Search in Google Scholar

Rivest, R., Shamir, A., & Adleman, L. (1978). A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, Vol. 21, Issue 2, 120–126.Search in Google Scholar

eISSN:
2247-840X
Lingua:
Inglese