Incremental Authentication of Tree-Structured Documents
暂无分享,去创建一个
[1] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[2] Yvo Desmedt,et al. Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.
[3] Phillip Rogaway,et al. Bucket Hashing and Its Application to Fast Message Authentication , 1995, Journal of Cryptology.
[4] W. J. Thron,et al. Encyclopedia of Mathematics and its Applications. , 1982 .
[5] Thomas Johansson,et al. Contributions to unconditionally secure authentication , 1994 .
[6] Mihir Bellare,et al. Incremental Cryptography: The Case of Hashing and Signing , 1994, CRYPTO.
[7] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[8] Rudolf Lide,et al. Finite fields , 1983 .
[9] Mihir Bellare,et al. A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost , 1997, EUROCRYPT.
[10] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[11] Walter Fumy,et al. Advances in Cryptology — EUROCRYPT ’97 , 2001, Lecture Notes in Computer Science.
[12] Mihir Bellare,et al. Incremental cryptography and application to virus protection , 1995, STOC '95.