A method for creating a block chain address private key
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted here that the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute conflicts with each other.
[0030] Before the present invention is further described, some proper nouns involved in the present invention are briefly explained:
[0031] Secure Hash Algorithm: Secure Hash Algorithm SHA (Secure Hash Algorithm) is a series of cryptographic hash functions designed by the National Security Agency (NSA) and released by the National Institute of Standards and Technology (NIST), including SHA-1, SHA -224, SHA-256, SHA-384, and SHA-512 variants. It is mainly applicable to the digital signature algorithm (Digital Signature Algorithm DSA) defined in the digital signature standard (DigitalSignature Standard DSS), where t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


