A survey of consensus algorithms in public blockchain systems for crypto-currencies

MS Ferdous, MJM Chowdhury, MA Hoque - Journal of Network and …, 2021 - Elsevier
In recent years, crypto-currencies (a form of decentralised digital currencies) have been
quite popular as an alternative form of payments. They are underpinned by a breakthrough …

Blockchain consensus algorithms: A survey

MS Ferdous, MJM Chowdhury, MA Hoque… - arXiv preprint arXiv …, 2020 - arxiv.org
In recent years, blockchain technology has received unparalleled attention from academia,
industry, and governments all around the world. It is considered a technological …

SoK of used cryptography in blockchain

M Raikwar, D Gligoroski, K Kralevska - IEEE Access, 2019 - ieeexplore.ieee.org
The underlying fundaments of blockchain are cryptography and cryptographic concepts that
provide reliable and secure decentralized solutions. Although many recent papers study the …

Duplexing the sponge: single-pass authenticated encryption and other applications

G Bertoni, J Daemen, M Peeters… - Selected Areas in …, 2012 - Springer
This paper proposes a novel construction, called duplex, closely related to the sponge
construction, that accepts message blocks to be hashed and–at no extra cost–provides …

The software performance of authenticated-encryption modes

T Krovetz, P Rogaway - … : 18th International Workshop, FSE 2011, Lyngby …, 2011 - Springer
We study software performance of authenticated-encryption modes CCM, GCM, and OCB.
Across a variety of platforms, we find OCB to be substantially faster than either alternative …

ASIC-resistance of multi-hash proof-of-work mechanisms for blockchain consensus protocols

H Cho - IEEE Access, 2018 - ieeexplore.ieee.org
Blockchain technology rapidly gained popularity based on its open and decentralized
operation. Consensus protocol is the core mechanism of a blockchain network that securely …

Fair and comprehensive methodology for comparing hardware performance of fourteen round two SHA-3 candidates using FPGAs

K Gaj, E Homsirikamol, M Rogawski - International Workshop on …, 2010 - Springer
Performance in hardware has been demonstrated to be an important factor in the evaluation
of candidates for cryptographic standards. Up to now, no consensus exists on how such an …

A lightweight 256-bit hash function for hardware and low-end devices: Lesamnta-LW

S Hirose, K Ideguchi, H Kuwakado, T Owada… - Information Security and …, 2011 - Springer
This paper proposes a new lightweight 256-bit hash function Lesamnta-LW with claimed
security levels of at least 2 120 with respect to collision, preimage, and second preimage …

The differential analysis of S-functions

N Mouha, V Velichkov, C De Canniere… - International Workshop on …, 2010 - Springer
An increasing number of cryptographic primitives use operations such as addition modulo 2
n, multiplication by a constant and bitwise Boolean functions as a source of non-linearity. In …

Statistical analysis of block ciphers and hash functions

F Sulak - 2011 - open.metu.edu.tr
One of the most basic properties expected from block ciphers and hash functions is passing
statistical randomness testing, as they are supposed to behave like random mappings …