Skip to main content
. 2018 Jul 17;16:257–266. doi: 10.1016/j.csbj.2018.06.004

Fig. 8.

Fig. 8

A binary Merkle Hash Tree constructed for authentic values y0, 0, y0, 1, y0, 2, y0, 3. The node values needed to verify y0, 0 are enclosed with dashed borders.