Maximizing blockchain security: Merkle tree hash values generated through advanced vectorized elliptic curve cryptography mechanisms.
Durgesh M. SharmaShishir Kumar ShandilyaSuresh Chandra SatapathyPublished in: Concurr. Comput. Pract. Exp. (2023)
Keyphrases
- elliptic curve cryptography
- elliptic curve
- cryptographic algorithms
- high security
- security analysis
- public key
- authentication scheme
- b tree
- digital watermark
- error correction
- public key cryptography
- tree structure
- public key cryptosystems
- security mechanisms
- hash functions
- security requirements
- digital signature
- image encryption
- provably secure
- data structure
- index structure
- user authentication
- efficient computation
- multimedia data
- smart card
- security policies
- security model
- security protocols
- secret key
- key management