AA Al-Saggaf, H Acharya - International Journal of Computer Network …, 2013 - academia.edu
By considering the security flaws in cryptographic hash functions, any commitment scheme
designed straight through hash function usage in general terms is insecure. In this paper, we …