Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,760 papers from all fields of science
Search
Sign In
Create Free Account
Merkle signature scheme
The Merkle signature scheme is a digital signature scheme based on hash trees (also called Merkle trees) and one-time signatures such as the Lamport…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Digital signature
Hash function
Merkle tree
Moti Yung
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Magnetic Field and Temperature Sensing Based on a Macro-Bending Fiber Structure and an FBG
Yaofei Chen
,
Q. Han
,
W. Yan
,
YUN-ZHI Yao
,
Tiegen Liu
IEEE Sensors Journal
2016
Corpus ID: 10304773
In this paper, an optical fiber sensor for simultaneous measurement of magnetic field and temperature is proposed and…
Expand
2015
2015
The Tradition of Writing Qur’anic Commentaries in Java and Sund
M. Segi
,
penggunaan aksara
,
+9 authors
P. Riddell
2015
Corpus ID: 65518235
Artikel ini bertujuan mengkaji tradisi penulisan dan penyalinan tafsir Al-Qur'an di kawasan budaya Jawa dan Sunda dari abad ke-18…
Expand
2012
2012
Perfect Confidentiality Network: A Solution for Information Theoretically Secure Key Agreement
Johannes Braun
,
J. Buchmann
International Conference on New Technologies…
2012
Corpus ID: 7539768
Encryption is used in order to achieve confidentiality in today's and future IT systems. However, the security of commonly used…
Expand
2011
2011
Integrated/hybrid satellite and terrestrial networks for satellite IMT‐Advanced services
Do-Seob Ahn
,
H. Kim
,
Jaekyoung Ahn
,
Dong-Chul Park
International Journal of Satellite Communications…
2011
Corpus ID: 35675323
This paper addresses key features of the satellite component of IMT‐Advanced systems, including candidate system architectures…
Expand
2010
2010
A fast hash tree generator for Merkle signature scheme
Abdulhadi Shoufan
,
Nico Huber
Proceedings of IEEE International Symposium on…
2010
Corpus ID: 2226501
The Merkle Signature Scheme relies on hash function and is, therefore, assumed to be resistant to attacks by quantum computers…
Expand
2007
2007
Merkle Tree Traversal Techniques
Boris I. Ederov
2007
Corpus ID: 61409777
5 Chapter 1: Introduction 6 Chapter 2: The Basics 8 2.1 Hash and One–Way Functions 8 2.1.1 One Way Functions 8 2.1.2 Hash…
Expand
2005
2005
A Communication-Induced Checkpointing and Asynchronous Recovery Protocol for Mobile Computing Systems
T. Tantikul
,
D. Manivannan
International Conference on Parallel and…
2005
Corpus ID: 15324770
Mobile computing systems have many constraints such as low battery power, low bandwidth , high mobility and lack of stable…
Expand
2005
2005
Improvements to the Merkle signature scheme ( extended abstract )
Luis Carlos Coronado García
2005
Corpus ID: 2987597
We propose two efficient and secure versions of the Merkle signature scheme. One of them is forward secure and its security is…
Expand
1986
1986
Identification of two southern pine species in high-resolution aerial MSS data
J. Hughes
,
D. L. Evans
,
P. Y. Burns
,
J. Hill
1986
Corpus ID: 132842850
Highly Cited
1986
Highly Cited
1986
Use of Remotely Sensed Data for Assessing Forest Stand Conditions in the Eastern United States
Darrel L. Williams
,
R. Nelson
IEEE Transactions on Geoscience and Remote…
1986
Corpus ID: 12298504
The results of three interrelated research activities conducted by Goddard scientists in support of the AgRISTARS Renewable…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE