Multiple hashing in a cryptographic scheme

US-201213458320-A
Stocking
Nationwide
Liên hệ
0x0
0 (gram)

(en)Methods, systems, and computer programs for producing hash values are disclosed. A first hash value is obtained by applying a first hash function to a first input. The first input can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A second hash value is obtained by applying a second hash function to a second input. The second input is based on the first hash value. The second hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the second hash value. In some instances, a digital signature is generated based on the second hash value, or a digital signature is verified based on the second hash value, as appropriate.

You are commenting for Multiple hashing in a cryptographic scheme


You are contracting for Multiple hashing in a cryptographic scheme


Expert Multiple hashing in a cryptographic scheme

Full name: Đoàn Thị Kiều Oanh

VTEX2208
(+84) 982 982 604
kieuoanh.doan@gmail.com

Address : Phường Quyết Tâm, TP. Sơn La, Tỉnh Sơn La