SoK of used cryptography in blockchain
The underlying fundaments of blockchain are cryptography and cryptographic concepts that
provide reliable and secure decentralized solutions. Although many recent papers study the …
provide reliable and secure decentralized solutions. Although many recent papers study the …
A comprehensive review of the security flaws of hashing algorithms
A Sadeghi-Nasab, V Rafe - Journal of Computer Virology and Hacking …, 2023 - Springer
The blockchain is an emerging technology. It is widely used because of its efficiency and
functionality. The hash function, as a supporting aspect of the data structure, is critical for …
functionality. The hash function, as a supporting aspect of the data structure, is critical for …
Cryptographic competitions
DJ Bernstein - Journal of Cryptology, 2024 - Springer
Cryptographic Competitions | Journal of Cryptology Skip to main content SpringerLink Account
Menu Find a journal Publish with us Search Cart 1.Home 2.Journal of Cryptology 3.Article …
Menu Find a journal Publish with us Search Cart 1.Home 2.Journal of Cryptology 3.Article …
Performance of hash algorithms on gpus for use in blockchain
A Kuznetsov, K Shekhanin, A Kolhatin… - … on advanced trends …, 2019 - ieeexplore.ieee.org
The main cryptographic primitives in blockchain networks are hashing functions that are
designed to form short and unpredictable digests for the message entered. In blockchain …
designed to form short and unpredictable digests for the message entered. In blockchain …
A compact FPGA-based processor for the Secure Hash Algorithm SHA-256
R García, I Algredo-Badillo, M Morales-Sandoval… - Computers & Electrical …, 2014 - Elsevier
This work reports an efficient and compact FPGA processor for the SHA-256 algorithm. The
novel processor architecture is based on a custom datapath that exploits the reusing of …
novel processor architecture is based on a custom datapath that exploits the reusing of …
FPGA-based implementation alternatives for the inner loop of the Secure Hash Algorithm SHA-256
I Algredo-Badillo, C Feregrino-Uribe… - Microprocessors and …, 2013 - Elsevier
Hash function algorithms are widely used to provide security services of integrity and
authentication, being SHA-2 the latest set of hash algorithms standardized by the US …
authentication, being SHA-2 the latest set of hash algorithms standardized by the US …
Life-logging in smart environments: Challenges and security threats
NE Petroulakis, IG Askoxylakis… - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
As the world becomes an interconnected network in which objects and humans interact, new
challenges and threats appear. In this interconnected world, smart objects seam to have an …
challenges and threats appear. In this interconnected world, smart objects seam to have an …
A lightweight framework for secure life-logging in smart environments
As the world becomes an interconnected network where objects and humans interact with
each other, new challenges and threats appear in the ecosystem. In this interconnected …
each other, new challenges and threats appear in the ecosystem. In this interconnected …
[PDF][PDF] A new hashing algorithm—HAS01: Development, cryptographic properties and inclusion in graduate studies
N Kapalova, D Dyusenbayev, K Sakan - Glob. J. Eng. Educ, 2022 - wiete.com.au
A new hashing algorithm-HAS01 is considered in this article. This algorithm is part of the
hash function of the SHA-3 family, and was developed on the basis of the cryptographic …
hash function of the SHA-3 family, and was developed on the basis of the cryptographic …
[PDF][PDF] Performance study of enhanced SHA-256 algorithm
A Gowthaman, M Sumathi - International Journal of Applied …, 2015 - researchgate.net
The prolong growth of wired and wireless communication has spark off the revolution for the
generation of new cryptographic algorithms. Hash functions are similar and important …
generation of new cryptographic algorithms. Hash functions are similar and important …