A brief survey of cryptocurrency systems

U Mukhopadhyay, A Skjellum… - 2016 14th annual …, 2016 - ieeexplore.ieee.org
Cryptocurrencies have emerged as important financial software systems. They rely on a
secure distributed ledger data structure; mining is an integral part of such systems. Mining …

State of the art of zero-knowledge proofs in blockchain

D Čapko, S Vukmirović, N Nedić - 2022 30th …, 2022 - ieeexplore.ieee.org
Blockchain technology promises a decentralized ecosystem for building apps with
decentralized ownership and high security level. One of the most adopted blockchain …

Measuring ethereum network peers

SK Kim, Z Ma, S Murali, J Mason, A Miller… - Proceedings of the …, 2018 - dl.acm.org
Ethereum, the second-largest cryptocurrency valued at a peak of $138 billion in 2018, is a
decentralized, Turing-complete computing platform. Although the stability and security of …

[LLIBRE][B] Introduction to cryptography

H Delfs, H Knebl, H Knebl - 2002 - Springer
VI Preface methods from information theory. Unconditionally secure schemes are now
addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …

Iot-oas: An oauth-based authorization service architecture for secure services in iot scenarios

S Cirani, M Picone, P Gonizzi, L Veltri… - IEEE sensors …, 2014 - ieeexplore.ieee.org
Open authorization (OAuth) is an open protocol, which allows secure authorization in a
simple and standardized way from third-party applications accessing online services, based …

Chaskey: an efficient MAC algorithm for 32-bit microcontrollers

N Mouha, B Mennink, A Van Herrewege… - Selected Areas in …, 2014 - Springer
We propose Chaskey: a very efficient Message Authentication Code (MAC) algorithm for 32-
bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot …

PPFchain: A novel framework privacy-preserving blockchain-based federated learning method for sensor networks

BB Sezer, H Turkmen, U Nuriyev - Internet of Things, 2023 - Elsevier
Abstract Internet of Things (IoT) has been widely used in many smart applications such as
smart cities, smart agriculture, healthcare, industry, etc. In addition, the importance of IoT …

TPPSUPPLY: A traceable and privacy-preserving blockchain system architecture for the supply chain

BB Sezer, S Topal, U Nuriyev - Journal of Information Security and …, 2022 - Elsevier
Traceability and auditability are key structures in supply chain management and
construction. However, trust is the most important aspect of customers in these systems …

[LLIBRE][B] About cryptographic engineering

ÇK Koç - 2009 - Springer
Cryptographic engineering is the name we have coined to refer to the theory and practice of
engineering of cryptographic systems, ie, encryption and decryption engines, digital …

ASIC-resistance of multi-hash proof-of-work mechanisms for blockchain consensus protocols

H Cho - IEEE Access, 2018 - ieeexplore.ieee.org
Blockchain technology rapidly gained popularity based on its open and decentralized
operation. Consensus protocol is the core mechanism of a blockchain network that securely …