Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Merkle tree

Known as: Tiger-Tree Hash, TTH, Merkle 
In cryptography and computer science, a hash tree or Merkle tree is a tree in which every non-leaf node is labelled with the hash of the labels or… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Abstract Fully Homomorphic encryption-based Merkle Tree (FHMT) is a novel technique for streaming authenticated data structures… Expand
Is this relevant?
2017
2017
In the cloud storage framework, once clients remotely store their data on cloud storage providers, they will lose the physical… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2015
Highly Cited
2015
Cloud computing that provides elastic computing and storage resource on demand has become increasingly important due to the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 4
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Smart grid has emerged as the next generation of power grid, due to its reliability, flexibility, and efficiency. However, smart… Expand
  • figure 1
  • figure 2
  • figure 3
  • table II
  • figure 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We propose a new algorithm for computing authentication paths in the Merkle signature scheme. Compared to the best algorithm for… Expand
  • figure 1
  • figure 2
  • table 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We propose GMSS, a new variant of the Merkle signature scheme. GMSS is the first Merkle-type signature scheme that allows a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In today's digital world, computer security issues have become increasingly important. In particular, researchers have proposed… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Replay attacks are often the most costly attacks to thwart when dealing with off-chip memory integrity. With a trusted System-on… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We present a technique for Merkle tree traversal which requires only logarithmic space and time. For a tree with N leaves, our… Expand
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Some emerging applications require programs to maintain sensitive state on untrusted hosts. This paper presents the architecture… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?