Back to Results
First PageMeta Content
Cryptographic hash functions / Error detection and correction / Hash tree / Digital signature / Cryptographic primitive / Merkle signature scheme / Lamport signature / Cryptography / Hashing / Public-key cryptography


High throughput asynchronous algorithms for message authentication Scott A Crosby and Dan S. Wallach Rice University December 14, 2010 Abstract
Add to Reading List

Document Date: 2010-12-14 09:05:23


Open Document

File Size: 173,46 KB

Share Result on Facebook

Company

Bernstein / Twitter / Google / X5 / Facebook / /

Facility

Dan S. Wallach Rice University / /

IndustryTerm

with any other algorithm / public key algorithm / public key signature algorithm / public key digital signature algorithms / secure systems / cryptographic protocols / large computing clusters / throughput asynchronous algorithms / federation protocol / Stream authentication algorithms / batch algorithm / batch processing / web server / authentication algorithms / standalone product / overall algorithm / chat systems / batch-verification algorithms / public key algorithms / multiuser server / particular algorithm / comparable message-passing applications / hybrid signature algorithms / /

Organization

Rice University / /

Person

Rabin / Dan S. Wallach / Scott A Crosby / /

Position

logger / /

Product

Merkle / Wave service / Google Wave / /

ProgrammingLanguage

Java / /

Technology

underlying Wave technology / cryptography / RAM / particular algorithm / authentication algorithms / hybrid signature algorithms / Public key / public key algorithms / overall algorithm / Java / Batched public key algorithms / federation protocol / API / public key signature algorithm / Stream authentication algorithms / Internet messaging / public key algorithm / caching / batch algorithm / batch-verification algorithms / public key digital signature algorithms / digital signature / High throughput asynchronous algorithms / web server / underlying public key algorithm / /

SocialTag