Digital signatures have become a key technology for making the Internet and other IT-infrastructures secure. Digital signatures provide authenticity, integrity, and non-repudiation of data. Digital signatures are widely used in identification and authentication protocols. Therefore, the existence of secure digital signature algorithms is crucial for maintaining IT-security.
CITATION STYLE
Buchmann, J., Dahmen, E., & Szydlo, M. (2009). Hash-based Digital Signature Schemes. In Post-Quantum Cryptography (pp. 35–93). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-88702-7_3
Mendeley helps you to discover research relevant for your work.