How We Hire Writers

custom writing

All applicants go through a series of tests that check their level of English and knowledge of formatting styles. The applicant is also required to present a sample of writing to the Evaluation Department. If you wish to find out more about the procedure, check out the whole process.

How We Ensure Quality

Our Quality Control Department checks every single order for formatting, style, word usage, and authenticity. This lets us deliver certified assignment assistance that has no Internet rivals.

Steganography in the Blockchain

Please take a look at the attached PDF. The steganography that they are talking about is not simply about how blockchain encrypt the data, but about how people can “make use” of blockchain and embed data inside the block. In their research, they embed an integer in the block for the receiver to extract it later and get the secret integer inside.

I would like something similar with that – embedding data (any data, even just an integer) during the process of ECDSA signature secretly, and for the receiver to get the secret data that was hidden inside that. I don’t need a very specific algorithm. I just need a possible idea that might work, for example, in which process I can embed the data, where to embed the data ( r, s, v?)

following the flamework –
1) Why is it important?
2) optional – Is there any background information? (for people to understand the upcoming proposal)
3) What suboptimal process are you trying to improve? How have problems similar to this been studied?
4) important – Talk about the idea of embedding data in the ECDSA. (how? when? where?)
5)  The ways to test if the idea really work in the future.

Please feel free to let me know if I am being confusing.

You can leave a response, or trackback from your own site.

Leave a Reply

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes