SoK of used cryptography in blockchain

M Raikwar, D Gligoroski, K Kralevska - IEEE Access, 2019 - ieeexplore.ieee.org
The underlying fundaments of blockchain are cryptography and cryptographic concepts that
provide reliable and secure decentralized solutions. Although many recent papers study the …

A comprehensive review of the security flaws of hashing algorithms

A Sadeghi-Nasab, V Rafe - Journal of Computer Virology and Hacking …, 2023 - Springer
The blockchain is an emerging technology. It is widely used because of its efficiency and
functionality. The hash function, as a supporting aspect of the data structure, is critical for …

Cryptographic competitions

DJ Bernstein - Journal of Cryptology, 2024 - Springer
Cryptographic Competitions | Journal of Cryptology Skip to main content SpringerLink Account
Menu Find a journal Publish with us Search Cart 1.Home 2.Journal of Cryptology 3.Article …

Performance of hash algorithms on gpus for use in blockchain

A Kuznetsov, K Shekhanin, A Kolhatin… - … on advanced trends …, 2019 - ieeexplore.ieee.org
The main cryptographic primitives in blockchain networks are hashing functions that are
designed to form short and unpredictable digests for the message entered. In blockchain …

A compact FPGA-based processor for the Secure Hash Algorithm SHA-256

R García, I Algredo-Badillo, M Morales-Sandoval… - Computers & Electrical …, 2014 - Elsevier
This work reports an efficient and compact FPGA processor for the SHA-256 algorithm. The
novel processor architecture is based on a custom datapath that exploits the reusing of …

FPGA-based implementation alternatives for the inner loop of the Secure Hash Algorithm SHA-256

I Algredo-Badillo, C Feregrino-Uribe… - Microprocessors and …, 2013 - Elsevier
Hash function algorithms are widely used to provide security services of integrity and
authentication, being SHA-2 the latest set of hash algorithms standardized by the US …

Life-logging in smart environments: Challenges and security threats

NE Petroulakis, IG Askoxylakis… - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
As the world becomes an interconnected network in which objects and humans interact, new
challenges and threats appear. In this interconnected world, smart objects seam to have an …

A lightweight framework for secure life-logging in smart environments

NE Petroulakis, EZ Tragos, AG Fragkiadakis… - … security technical report, 2013 - Elsevier
As the world becomes an interconnected network where objects and humans interact with
each other, new challenges and threats appear in the ecosystem. In this interconnected …

[PDF][PDF] A new hashing algorithm—HAS01: Development, cryptographic properties and inclusion in graduate studies

N Kapalova, D Dyusenbayev, K Sakan - Glob. J. Eng. Educ, 2022 - wiete.com.au
A new hashing algorithm-HAS01 is considered in this article. This algorithm is part of the
hash function of the SHA-3 family, and was developed on the basis of the cryptographic …

[PDF][PDF] Performance study of enhanced SHA-256 algorithm

A Gowthaman, M Sumathi - International Journal of Applied …, 2015 - researchgate.net
The prolong growth of wired and wireless communication has spark off the revolution for the
generation of new cryptographic algorithms. Hash functions are similar and important …