[HTML][HTML] A review of blockchain in fintech: taxonomy, challenges, and future directions

K Nelaturu, H Du, DP Le - Cryptography, 2022 - mdpi.com
The primary purpose of this paper is to bridge the technology gap between Blockchain and
Fintech applications. Blockchain technology is already being explored in a wide number of …

[PDF][PDF] Cryptographic hash functions: a review

R Sobti, G Geetha - International Journal of Computer Science Issues …, 2012 - Citeseer
Cryptographic Hash Functions: A Review Page 1 Cryptographic Hash Functions: A Review Rajeev
Sobti1, G.Geetha2 1School of Computer Science, Lovely Professional University Phagwara …

[PDF][PDF] Zcash protocol specification

D Hopwood, S Bowe, T Hornby… - GitHub: San …, 2016 - … -file-uploads-global.s3.dualstack.us …
Zcash is an implementation of the Decentralized Anonymous Payment scheme Zerocash,
with security fixes and improvements to performance and functionality. It bridges the existing …

A survey of how to use blockchain to secure internet of things and the stalker attack

EF Jesus, VRL Chicarino… - Security and …, 2018 - Wiley Online Library
The Internet of Things (IoT) is increasingly a reality today. Nevertheless, some key
challenges still need to be given particular attention so that IoT solutions further support the …

[图书][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

The elliptic curve digital signature algorithm (ECDSA)

D Johnson, A Menezes, S Vanstone - International journal of information …, 2001 - Springer
Abstract The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve
analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI …

Security arguments for digital signatures and blind signatures

D Pointcheval, J Stern - Journal of cryptology, 2000 - Springer
Since the appearance of public-key cryptography in the seminal Diffie—Hellman paper,
many new schemes have been proposed and many have been broken. Thus, the simple fact …

[HTML][HTML] HMAC: Keyed-hashing for message authentication

H Krawczyk, M Bellare, R Canetti - 1997 - rfc-editor.org
RFC 2104: HMAC: Keyed-Hashing for Message Authentication [RFC Home] [TEXT|PDF|HTML]
[Tracker] [IPR] [Errata] [Info page] INFORMATIONAL Updated by: 6151 Errata Exist Network …

Elliptic curve cryptography in practice

JW Bos, JA Halderman, N Heninger, J Moore… - … Cryptography and Data …, 2014 - Springer
In this paper we perform a review of elliptic curve cryptography (ECC) as it is used in
practice today in order to reveal unique mistakes and vulnerabilities that arise in …

How to break MD5 and other hash functions

X Wang, H Yu - Annual international conference on the theory and …, 2005 - Springer
MD5 is one of the most widely used cryptographic hash functions nowadays. It was
designed in 1992 as an improvement of MD4, and its security was widely studied since then …