Blockchain ecosystem—Technological and management opportunities and challenges
Blockchain is increasingly deployed in a broad range of sectors, ranging from banking and
finance to manufacturing to energy to transportation, and so on. While many technological …
finance to manufacturing to energy to transportation, and so on. While many technological …
Differential privacy in blockchain technology: A futuristic approach
Blockchain has received a widespread attention because of its decentralized, tamper-proof,
and transparent nature. Blockchain works over the principle of distributed, secured, and …
and transparent nature. Blockchain works over the principle of distributed, secured, and …
Attacks against cross-chain systems and defense approaches: A contemporary survey
L Duan, Y Sun, W Ni, W Ding, J Liu… - IEEE/CAA Journal of …, 2023 - ieeexplore.ieee.org
The blockchain cross-chain is a significant technology for inter-chain interconnection and
value transfer among different blockchain networks. Cross-chain overcomes the “information …
value transfer among different blockchain networks. Cross-chain overcomes the “information …
A Comprehensive Survey on Green Blockchain: Develo** the Next Generation of Energy Efficient and Sustainable Blockchain Systems
Although Blockchain has been successfully used in many different fields and applications, it
has been traditionally regarded as an energy-intensive technology, essentially due to the …
has been traditionally regarded as an energy-intensive technology, essentially due to the …
Investigating the avalanche effect of various cryptographically secure Hash functions and Hash-based applications
D Upadhyay, N Gaikwad, M Zaman, S Sampalli - IEEE Access, 2022 - ieeexplore.ieee.org
In modern cryptography, hash functions are considered as one of the key components for
secure communication. They play a vital role in a wide range of applications such as …
secure communication. They play a vital role in a wide range of applications such as …
A high-efficiency FPGA-based multimode SHA-2 accelerator
The secure hash algorithm 2 (SHA-2) family, including the SHA-224/256/384/512 hash
functions, is widely adopted in many modern domains, ranging from Internet of Things …
functions, is widely adopted in many modern domains, ranging from Internet of Things …
Blockchain based optimized data storage with secure communication for Internet of Vehicles considering active, passive, and double spending attacks
In the study, we propose a double blockchain based vehicular system for optimizing data
storage and securing communication in Internet of Vehicles (IoV) networks. We propose an …
storage and securing communication in Internet of Vehicles (IoV) networks. We propose an …
The paradigm logic of blockchain governance
S ** - Technology in Society, 2024 - Elsevier
Blockchain technology is mainly composed of public-key cryptography, hash algorithms and
consensus mechanisms. Blockchain solves the two trust problems inherent in human …
consensus mechanisms. Blockchain solves the two trust problems inherent in human …
MeHLDT: A multielement hash lock data transfer mechanism for on-chain and off-chain
B Yu, L Feng, H Zhu, F Qiu, J Wan, S Yao - Peer-to-Peer Networking and …, 2023 - Springer
The trusted interaction of on-chain and off-chain data is an important foundation for large-
scale applications of blockchain systems. When the blockchain system processes massive …
scale applications of blockchain systems. When the blockchain system processes massive …
A new message expansion structure for full pipeline SHA-2
Y Zhang, Z He, M Wan, M Zhan… - … on Circuits and …, 2021 - ieeexplore.ieee.org
Once there are constant or infrequently changed bits (COIBs) in two adjacent input
messages of SHA-2, the switching power of input messages data registers (IMD-REGs) used …
messages of SHA-2, the switching power of input messages data registers (IMD-REGs) used …