[图书][B] Cryptography engineering: design principles and practical applications
N Ferguson, B Schneier, T Kohno - 2011 - books.google.com
The ultimate guide to cryptography, updated from an author team of the world's top
cryptography experts. Cryptography is vital to keeping information safe, in an era when the …
cryptography experts. Cryptography is vital to keeping information safe, in an era when the …
[图书][B] Introduction to reliable and secure distributed programming
In modern computing a program is usually distributed among several processes. The
fundamental challenge when developing reliable and secure distributed programs is to …
fundamental challenge when developing reliable and secure distributed programs is to …
Constant-size commitments to polynomials and their applications
A Kate, GM Zaverucha, I Goldberg - … on the Theory and Application of …, 2010 - Springer
We introduce and formally define polynomial commitment schemes, and provide two
efficient constructions. A polynomial commitment scheme allows a committer to commit to a …
efficient constructions. A polynomial commitment scheme allows a committer to commit to a …
The elliptic curve digital signature algorithm (ECDSA)
D Johnson, A Menezes, S Vanstone - International journal of information …, 2001 - Springer
Abstract The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve
analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI …
analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI …
PRESENT: An ultra-lightweight block cipher
With the establishment of the AES the need for new block ciphers has been greatly
diminished; for almost all block cipher applications the AES is an excellent and preferred …
diminished; for almost all block cipher applications the AES is an excellent and preferred …
[图书][B] Cryptography: theory and practice
DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …
enormous praise and popularity, and soon became the standard textbook for cryptography …
Towards circular economy in the textiles and clothing value chain through blockchain technology and IoT: A review
The textile and clothing industry sector has today a big environmental impact, not only due to
the consumption of water and the use of toxic chemicals but also due to the increasing levels …
the consumption of water and the use of toxic chemicals but also due to the increasing levels …
[HTML][HTML] Blockchain and Internet of Things in smart cities and drug supply management: Open issues, opportunities, and future directions
Blockchain-based drug supply management (DSM) requires powerful security and privacy
procedures for high-level authentication, interoperability, and medical record sharing …
procedures for high-level authentication, interoperability, and medical record sharing …
Short signatures from the Weil pairing
We introduce a short signature scheme based on the Computational Diffie-Hellman
assumption on certain elliptic and hyper-elliptic curves. The signature length is half the size …
assumption on certain elliptic and hyper-elliptic curves. The signature length is half the size …
A RGB image encryption algorithm based on total plain image characteristics and chaos
MA Murillo-Escobar, C Cruz-Hernández… - Signal Processing, 2015 - Elsevier
Currently, color image encryption is important to ensure its confidentiality during its
transmission on insecure networks or its storage. The fact that chaotic properties are related …
transmission on insecure networks or its storage. The fact that chaotic properties are related …