Hash-based Digital Signature Schemes

  • Buchmann J
  • Dahmen E
  • Szydlo M
N/ACitations
Citations of this article
31Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Digital signatures have become a key technology for making the Internet and other IT-infrastructures secure. Digital signatures provide authenticity, integrity, and non-repudiation of data. Digital signatures are widely used in identification and authentication protocols. Therefore, the existence of secure digital signature algorithms is crucial for maintaining IT-security.

Cite

CITATION STYLE

APA

Buchmann, J., Dahmen, E., & Szydlo, M. (2009). Hash-based Digital Signature Schemes. In Post-Quantum Cryptography (pp. 35–93). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-88702-7_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free