Have a personal or library account? Click to login
On the Efficiency of the Lamport Signature Scheme Cover

On the Efficiency of the Lamport Signature Scheme

By: Daniel Zentai  
Open Access
|Sep 2020

References

  1. Bernstein, D.J. (2009). Introduction to post-quantum cryptography. In Bernstein, D. J., Buchmann, J., & Dahmen, E. (Eds), Post-Quantum Cryptography. Berlin, Heidelberg: Springer.10.1007/978-3-540-88702-7
  2. Katz, J. & Lindell, Y. (2007). Introduction to Modern Cryptography. Chapman & Hall/Crc Cryptography and Network Security Series.10.1201/9781420010756
  3. Lamport, L. (1979). Constructing digital signatures from a one-way function. Technical Report SRI-CSL-98, SRI International Computer Science Laboratory.
  4. Merkle, R.C. (1988). A Digital Signature Based on a Conventional Encryption Function. Advances in Cryptology – CRYPTO ’87. Lecture Notes in Computer Science. Vol. 293, 369-378.
  5. National Institute of Standards and Technology. (1994). Digital Signature Standard (DSS). Federal Information Processing Standards Publication.
  6. Rivest, R., Shamir, A., & Adleman, L. (1978). A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, Vol. 21, Issue 2, 120–126.
DOI: https://doi.org/10.2478/raft-2020-0033 | Journal eISSN: 3100-5071 | Journal ISSN: 3100-5063
Language: English
Page range: 275 - 280
Published on: Sep 22, 2020
Published by: Nicolae Balcescu Land Forces Academy
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2020 Daniel Zentai, published by Nicolae Balcescu Land Forces Academy
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.