Post-Quantum Cryptography
DOI: 10.1007/978-3-540-88702-7_3
|View full text |Cite
|
Sign up to set email alerts
|

Hash-based Digital Signature Schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0
3

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 49 publications
(47 citation statements)
references
References 21 publications
0
26
0
3
Order By: Relevance
“…It was introduced in [18] and a detailed description of MSS can be found in [7]. Details about the implementation inspiring our work are given in [19].…”
Section: Hash-based Signaturesmentioning
confidence: 99%
See 4 more Smart Citations
“…It was introduced in [18] and a detailed description of MSS can be found in [7]. Details about the implementation inspiring our work are given in [19].…”
Section: Hash-based Signaturesmentioning
confidence: 99%
“…Hence, algorithms for efficient on-the-fly authentication path computation during signature generation are required. The currently best known algorithm for on-the-fly computation of authentication nodes is the BDS algorithm [7] (Algo. 3, cf.…”
Section: Authentication Path Computationmentioning
confidence: 99%
See 3 more Smart Citations