[图书][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

A secure and optimally efficient multi‐authority election scheme

R Cramer, R Gennaro… - European transactions on …, 1997 - Wiley Online Library
In this paper we present a new multi‐authority secret‐ballot election scheme that guarantees
privacy, universal veriability, and robustness. It is the first scheme for which the performance …

Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance

P Rogaway, T Shrimpton - … : 11th International Workshop, FSE 2004, Delhi …, 2004 - Springer
We consider basic notions of security for cryptographic hash functions: collision resistance,
preimage resistance, and second-preimage resistance. We give seven different definitions …

RIPEMD-160: A strengthened version of RIPEMD

H Dobbertin, A Bosselaers, B Preneel - International Workshop on Fast …, 1996 - Springer
Cryptographic hash functions are an important tool in cryptography for applications such as
digital fingerprinting of messages, message authentication, and key derivation. During the …

Hash functions based on block ciphers: A synthetic approach

B Preneel, R Govaerts, J Vandewalle - Advances in Cryptology—CRYPTO' …, 1994 - Springer
Constructions for hash functions based on a block cipher are studied where the size of the
hashcode is equal to the block length of the block cipher and where the key size is …

Blockchain 1.0 to blockchain 4.0—The evolutionary transformation of blockchain technology

P Mukherjee, C Pradhan - Blockchain technology: applications and …, 2021 - Springer
Blockchain is a propitious technology that has gained immense popularity and tractions. It
has tremendously revolutionized the peer-to-peer information exchange by combining …

RETRACTED ARTICLE: A multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment

T Joseph, SA Kalaiselvan, SU Aswathy… - Journal of Ambient …, 2021 - Springer
In recent days, due to the advent of advanced technologies such as cloud computing,
accessing data can be done anywhere at any time. Meanwhile, ensuring the data security is …

Attributes of captured objects in a capture system

W Deninger, E de la Iglesia - US Patent 7,730,011, 2010 - Google Patents
4,286.255. A 8/1981 Siy 4,710,957 A 12, 1987 Bocci et al. 5,465.299 A 11/1995 Matsumoto
et al. 5,557,747 A 9/1996 Rogers et al. 5,768,578 A 6, 1998 Kirk 5,781,629 A 7, 1998 Haber …

Attributes of captured objects in a capture system

W Deninger, E de la Iglesia - US Patent 8,176,049, 2012 - Google Patents
Related US Application Data El Euli Y. Wu P Capital G ttorney, Agent, or Firm—Patent
Capital Grou (62) Division of application No. 1 1/254,436, filed on Oct.(74) ey, Ag pp 19 …

File system for a capture system

R Lowe, S Broeker, W Liu - US Patent 7,949,849, 2011 - Google Patents
US PATENT DOCUMENTS 4,286.255. A 8/1981 Siy 4,710,957 A 12/1987 Bocci et al.
5,249,289 A 9, 1993 Thammet al. 5,465.299 A 11/1995 Matsumoto et al. 5,479,654 A …