December 30, 2006
Cryptology ePrint Archive: "
Abstract. Hash Chains are used extensively in various cryptographic systems such as one-time passwords, server supported signatures, secure address resolution, certificate revocation, micropayments etc."
source
This entry was posted
on December 30, 2006 at 20:43.
You can skip to the end and leave a response.