Reviving the Idea of Incremental Cryptography for the Zettabyte Era Use Case: Incremental Hash Functions Based on SHA-3
暂无分享,去创建一个
Danilo Gligoroski | Simona Samardjiska | Hristina Mihajloska | Hristina Mihajloska | D. Gligoroski | Simona Samardjiska
[1] Mihir Bellare,et al. Incremental Cryptography: The Case of Hashing and Signing , 1994, CRYPTO.
[2] Wilson C. Hsieh,et al. Bigtable: A Distributed Storage System for Structured Data , 2006, TOCS.
[3] Morris J. Dworkin,et al. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .
[4] Guido Bertoni,et al. Sakura: A Flexible Coding for Tree Hashing , 2014, ACNS.
[5] Kirk Martinez,et al. Environmental Sensor Networks: A revolution in the earth system science? , 2006 .
[6] David A. Wagner,et al. A Generalized Birthday Problem , 2002, CRYPTO.
[7] Mihir Bellare,et al. A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost , 1997, EUROCRYPT.
[8] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[9] Guido Bertoni,et al. Sufficient conditions for sound tree and sequential hashing modes , 2013, International Journal of Information Security.