next up previous
Next: Proofs that Yield Nothing Up: The Post-Doctoral Period (1983-86) Previous: The Bit Security of

Two Remarks Concerning the GMR Signature Scheme

It is shown that the GMR signature scheme can be made memoryless as well as implemented in time comparable to a few RSA computations.


Comments: Authored by O. Goldreich. Appeared in



Oded Goldreich
2003-07-30