Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? release_ayfm6ch22vg7lkmvf3cvuhcmn4

by Ahto Buldas, Sven Laur

Published in Lecture Notes in Computer Science by Springer Berlin Heidelberg.

2006   p50-65

Archived Files and Locations

application/pdf  519.7 kB
file_ofcnxn6fdjc25bhnmzvlev7zwi
link.springer.com (publisher)
web.archive.org (webarchive)
application/pdf  144.8 kB
file_a5uk47vmf5abrmlx3r5mhth3h4
web.archive.org (webarchive)
lepo.it.da.ut.ee (web)
www.cs.ut.ee (web)
web.archive.org (webarchive)
cyber.ee (web)
+ 5 more URLs
Read Archived PDF
Preserved and Accessible
Type  chapter
Stage   published
Year   2006
Container Metadata
Not in DOAJ
Not in Keepers Registry
ISSN-L:  0302-9743
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
Catalog Record
Revision: a4a4fd4d-500a-4af4-bf96-58459a020299
API URL: JSON