Digital Signatures Out of Second-Preimage Resistant Hash Functions
From MaRDI portal
Publication:3535355
DOI10.1007/978-3-540-88403-3_8zbMath1177.94185OpenAlexW1499410213MaRDI QIDQ3535355
Katsuyuki Okeya, Camille Vuillaume, Erik Dahmen, Tsuyoshi Takagi
Publication date: 11 November 2008
Published in: Post-Quantum Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-88403-3_8
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (10)
An intermediate secret-guessing attack on hash-based signatures ⋮ LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4 ⋮ Characterizing collision and second-preimage resistance in Linicrypt ⋮ WOTS-S: a quantum secure compact signature scheme for distributed ledger ⋮ WOTSwana: a generalized \(\mathcal{S}_{\mathrm{ leeve }}\) construction for multiple proofs of ownership ⋮ Tweakable $$\mathcal {S}_{\text{ leeve }}$$: A Novel $$\mathcal {S}_{\text{ leeve }}$$ Construction Based on Tweakable Hash Functions ⋮ On the Security of the Winternitz One-Time Signature Scheme ⋮ Public Key Authentication with Memory Tokens ⋮ XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions ⋮ W-OTS\textsuperscript{+} up my sleeve! A hidden secure fallback for cryptocurrency wallets
Cites Work
- Unnamed Item
- Unnamed Item
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Advances in Cryptology - EUROCRYPT 2004
- How to Break MD5 and Other Hash Functions
- Finding Collisions in the Full SHA-1
- Fast Software Encryption
- Strengthening Digital Signatures Via Randomized Hashing
- Cryptography and Coding
This page was built for publication: Digital Signatures Out of Second-Preimage Resistant Hash Functions