Search

Your search keyword '"Merkle trees"' showing total 44 results

Search Constraints

Start Over You searched for: Descriptor "Merkle trees" Remove constraint Descriptor: "Merkle trees"
44 results on '"Merkle trees"'

Search Results

1. Merkle Trees

2. Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities.

3. Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation.

4. Validating δ-Currency Using Model Checking

5. Enhanced Security and Efficiency in Blockchain With Aggregated Zero-Knowledge Proof Mechanisms

6. Quotable Signatures for Authenticating Shared Quotes

7. Broken Proofs of Solvency in Blockchain Custodial Wallets and Exchanges

9. Blockchains with Five Merkle Trees to Support Financial Transactions

10. A Fast Heterogeneous Approach to Enhanced Blockchain Attack Resilience and Mitigation

11. GMMT: A Revocable Group Merkle Multi-tree Signature Scheme

14. User-Generated Pseudonyms Through Merkle Trees

15. Secure ambient intelligence prototype for airports.

16. Improving Blockchain Security Validation and Transaction Processing Through Heterogeneous Computing

17. Tunneling Trust Into the Blockchain: A Merkle Based Proof System for Structured Documents

18. A Supplementary Tool for Web-archiving Using Blockchain Technology

19. ON THE UNIVERSAL TREE MODE OF HASH CODE GENERATION

20. Blockchain-based verification framework for data integrity in edge-cloud storage.

21. A precise non-asymptotic complexity analysis of parallel hash functions without tree topology constraints.

22. Hash-Based TPM Signatures for the Quantum World

23. Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3

24. Online Mergers and Applications to Registration-Based Encryption and Accumulators

25. Bivariate Polynomials Modulo Composites and Their Applications

26. Merkle Trees

27. Online Mergers and Applications to Registration-Based Encryption and Accumulators

29. TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks

31. Tunneling Trust Into the Blockchain: A Merkle Based Proof System for Structured Documents

32. T₅: Hashing Five Inputs with Three Compression Calls

34. T₅: Hashing Five Inputs with Three Compression Calls

35. The Kupyna hash function application to SPHINCS+ signatures

36. Merkle Search Trees: Efficient State-Based CRDTs in Open Networks

37. Transparency Logs via Append-only Authenticated Dictionaries

38. Об универсальном древовидном режиме выработки хэш-кода

39. Constructing and leveraging one-way function with encryption

40. DottedDB: anti-entropy without merkle trees, deletes without tombstones

41. Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3

42. Data Fingerprinting -- Identifying Files and Tables with Hashing Schemes

43. Sparse Merkle Trees: Definitions and Space-Time Trade-Offs with Applications for Balloon

44. Protecting the content of externals memories in embedded systems, hardware aspect

Catalog

Books, media, physical & digital resources