Asian Journal of Information Technology
722 - 726
Alrehily, A.D., A.F. Alotaibi, S.B. Almutairy, M.S. Alqhtani and J. Kar, 2015. Conventional and improved digital signature scheme: A comparative study. J. Inform. Security, 6: 59-67.Direct Link |
Barber, S., X. Boyen, E. Shi and E. Uzun, 2012. Bitter to better-how to make bitcoin a better currency. Proceedinga of the International Conference on Financial Cryptography and Data Security, February 27-March 2, 2012, Springer, Berlin, Germany, pp: 399-414.
Brier, E. and M. Joye, 2002. Weierstraß elliptic curves and side-channel attacks. Proceedings of the International Conference on Public Key Cryptography, February 12-14, 2002, Springer, Berlin, Germany, pp: 335-345.
Haraty, R.A., A.N. El-Kassar and B. Shibaro, 2006. A comparative study of RSA based digital signature algorithms. J. Math. Statist., 2: 354-359.CrossRef | Direct Link |
Islam, M.S., 2015. An algorithm for electronic money transaction security (three layer security): A new approach. Intl. J. Secur. Appl., 9: 203-214.
Johnson, D., A. Menezes and S. Vanstone, 2001. The Elliptic Curve Digital Signature Algorithm (ECDSA). Int. J. Inform. Secur., 1: 36-63.CrossRef | Direct Link |
Khalique, A., K. Singh and S. Sood, 2010. Implementation of elliptic curve digital signature algorithm. Int. J. Comput. Appl., 2: 21-27.Direct Link |
Milanov, E., 2009. The RSA algorithm. RSA Laboratories, Bedford, Massachusetts.
Nakamoto, S., 2012. Bitcoin: A peer-to-peer electronic cash system 2009. Master Thesis, Pennsylvania State University, Pennsylvania.
Wang, D., 2014. Secure Implementation of ECDSA Signature in Bitcoin. University College London, London, England,.