WE Hall, CS Jutla - Selected Areas in Cryptography: 12th International …, 2006 - Springer
We define a new authentication tree in the symmetric key setting, which has the same
computational time, storage and security parameters as the well known Merkle …