A survey of consensus algorithms in public blockchain systems for crypto-currencies
MS Ferdous, MJM Chowdhury, MA Hoque - Journal of Network and …, 2021 - Elsevier
In recent years, crypto-currencies (a form of decentralised digital currencies) have been
quite popular as an alternative form of payments. They are underpinned by a breakthrough …
quite popular as an alternative form of payments. They are underpinned by a breakthrough …
Blockchain consensus algorithms: A survey
MS Ferdous, MJM Chowdhury, MA Hoque… - arXiv preprint arXiv …, 2020 - arxiv.org
In recent years, blockchain technology has received unparalleled attention from academia,
industry, and governments all around the world. It is considered a technological …
industry, and governments all around the world. It is considered a technological …
SoK of used cryptography in blockchain
The underlying fundaments of blockchain are cryptography and cryptographic concepts that
provide reliable and secure decentralized solutions. Although many recent papers study the …
provide reliable and secure decentralized solutions. Although many recent papers study the …
Duplexing the sponge: single-pass authenticated encryption and other applications
G Bertoni, J Daemen, M Peeters… - Selected Areas in …, 2012 - Springer
This paper proposes a novel construction, called duplex, closely related to the sponge
construction, that accepts message blocks to be hashed and–at no extra cost–provides …
construction, that accepts message blocks to be hashed and–at no extra cost–provides …
The software performance of authenticated-encryption modes
We study software performance of authenticated-encryption modes CCM, GCM, and OCB.
Across a variety of platforms, we find OCB to be substantially faster than either alternative …
Across a variety of platforms, we find OCB to be substantially faster than either alternative …
ASIC-resistance of multi-hash proof-of-work mechanisms for blockchain consensus protocols
H Cho - IEEE Access, 2018 - ieeexplore.ieee.org
Blockchain technology rapidly gained popularity based on its open and decentralized
operation. Consensus protocol is the core mechanism of a blockchain network that securely …
operation. Consensus protocol is the core mechanism of a blockchain network that securely …
Fair and comprehensive methodology for comparing hardware performance of fourteen round two SHA-3 candidates using FPGAs
Performance in hardware has been demonstrated to be an important factor in the evaluation
of candidates for cryptographic standards. Up to now, no consensus exists on how such an …
of candidates for cryptographic standards. Up to now, no consensus exists on how such an …
A lightweight 256-bit hash function for hardware and low-end devices: Lesamnta-LW
S Hirose, K Ideguchi, H Kuwakado, T Owada… - Information Security and …, 2011 - Springer
This paper proposes a new lightweight 256-bit hash function Lesamnta-LW with claimed
security levels of at least 2 120 with respect to collision, preimage, and second preimage …
security levels of at least 2 120 with respect to collision, preimage, and second preimage …
The differential analysis of S-functions
N Mouha, V Velichkov, C De Canniere… - International Workshop on …, 2010 - Springer
An increasing number of cryptographic primitives use operations such as addition modulo 2
n, multiplication by a constant and bitwise Boolean functions as a source of non-linearity. In …
n, multiplication by a constant and bitwise Boolean functions as a source of non-linearity. In …
Statistical analysis of block ciphers and hash functions
F Sulak - 2011 - open.metu.edu.tr
One of the most basic properties expected from block ciphers and hash functions is passing
statistical randomness testing, as they are supposed to behave like random mappings …
statistical randomness testing, as they are supposed to behave like random mappings …