共 50 条
- [42] A Simple Attack on a Recently Introduced Hash-Based Secure User Authentication Scheme INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 157 - 160
- [44] Cryptanalysis and improvement on a digital signature scheme without using one-way hash and message redundancy PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 266 - 269
- [46] Improving Stateless Hash-Based Signatures TOPICS IN CRYPTOLOGY - CT-RSA 2018, 2018, 10808 : 219 - 242
- [47] Hash-based signatures for the Internet of Things 2018 ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, 2018, : 332 - 335
- [48] HASH-BASED ALGORITHMS FOR DISCRETIZED DATA SIAM JOURNAL ON SCIENTIFIC COMPUTING, 2013, 35 (04): : C346 - C368
- [49] State Management for Hash-Based Signatures SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 244 - 260