Using Two-Steps Hash Func­tion to Sup­port Trust­wor­thy Si­gning.

Jörg Schwenk, Se­bas­ti­an Gajek, Lijun Liao,

Wes­tern Eu­ropean Work­shop on Re­se­arch in Cryp­to­lo­gy (WE­WoRC 2007), Bo­chum (Ger­ma­ny), 2007.

Tags: hash, si­gning, trust­wor­thy