Proceedings of the 2020 2nd International Conference on Information Technology and Computer Communications 2020
DOI: 10.1145/3417473.3417477
|View full text |Cite
|
Sign up to set email alerts
|

Improving the Performance of Blockchain Based Digital Contract Using Niederreiter Method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Any difficultto-invert function may be converted into a secure public-key signature system using hash-based cryptography. As a result, this might be a solution for post-quantum blockchains as discussed in [24], [32], [50], [71].…”
Section: ) Hash-based Signaturementioning
confidence: 99%
See 1 more Smart Citation
“…Any difficultto-invert function may be converted into a secure public-key signature system using hash-based cryptography. As a result, this might be a solution for post-quantum blockchains as discussed in [24], [32], [50], [71].…”
Section: ) Hash-based Signaturementioning
confidence: 99%
“…Network Layer [37], [38], [47], [39]- [46] 4 Data Layer [48], [49], [58]- [65], [50] Quantum Properties [18], [21], [89], [26], [28], [31], [41], [44], [46], [70], [88] 2 Hash Based Signature [24], [25], [50], [56], [58], [59], [71] 3 Code-Based Cryptography [22] 4 Lattice Based Cryptography [20], [23], [53], [54], [57], [62], [63], [90], [38]- [40], [43], [45], [49], [51], [52] 5 Multivariate Cryptography [37], [55], [64] 6 Directed Acyclic Graph [66], [67] 7 Quantum Blind Signature…”
Section: Data Extractionmentioning
confidence: 99%