Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Number Theory for Computing
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Hi-index | 0.00 |
Through the combination of digital signature algorithms and in-tegrated circuit chips, the paper puts forwards a new banknote anti-forgery method which may be regarded as an information system. The paper conceives the preliminary design of the system which includes the banknote print-data editing, key management, signing-code injection, and signing-code verification four modules, and describes the function of every module. The paper analyzes the security and effectiveness of the new method, discusses curtly the digital signature algorithms with a small modulus, and points out that the thought of the banknote anti-forgery system may be extended to passport anti-forgery for antiterrorism.