A brief survey of cryptocurrency systems
Cryptocurrencies have emerged as important financial software systems. They rely on a
secure distributed ledger data structure; mining is an integral part of such systems. Mining …
secure distributed ledger data structure; mining is an integral part of such systems. Mining …
State of the art of zero-knowledge proofs in blockchain
Blockchain technology promises a decentralized ecosystem for building apps with
decentralized ownership and high security level. One of the most adopted blockchain …
decentralized ownership and high security level. One of the most adopted blockchain …
Measuring ethereum network peers
Ethereum, the second-largest cryptocurrency valued at a peak of $138 billion in 2018, is a
decentralized, Turing-complete computing platform. Although the stability and security of …
decentralized, Turing-complete computing platform. Although the stability and security of …
[LLIBRE][B] Introduction to cryptography
H Delfs, H Knebl, H Knebl - 2002 - Springer
VI Preface methods from information theory. Unconditionally secure schemes are now
addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …
addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …
Iot-oas: An oauth-based authorization service architecture for secure services in iot scenarios
Open authorization (OAuth) is an open protocol, which allows secure authorization in a
simple and standardized way from third-party applications accessing online services, based …
simple and standardized way from third-party applications accessing online services, based …
Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
We propose Chaskey: a very efficient Message Authentication Code (MAC) algorithm for 32-
bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot …
bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot …
PPFchain: A novel framework privacy-preserving blockchain-based federated learning method for sensor networks
Abstract Internet of Things (IoT) has been widely used in many smart applications such as
smart cities, smart agriculture, healthcare, industry, etc. In addition, the importance of IoT …
smart cities, smart agriculture, healthcare, industry, etc. In addition, the importance of IoT …
TPPSUPPLY: A traceable and privacy-preserving blockchain system architecture for the supply chain
Traceability and auditability are key structures in supply chain management and
construction. However, trust is the most important aspect of customers in these systems …
construction. However, trust is the most important aspect of customers in these systems …
[LLIBRE][B] About cryptographic engineering
ÇK Koç - 2009 - Springer
Cryptographic engineering is the name we have coined to refer to the theory and practice of
engineering of cryptographic systems, ie, encryption and decryption engines, digital …
engineering of cryptographic systems, ie, encryption and decryption engines, digital …
ASIC-resistance of multi-hash proof-of-work mechanisms for blockchain consensus protocols
H Cho - IEEE Access, 2018 - ieeexplore.ieee.org
Blockchain technology rapidly gained popularity based on its open and decentralized
operation. Consensus protocol is the core mechanism of a blockchain network that securely …
operation. Consensus protocol is the core mechanism of a blockchain network that securely …