Results 51 to 60 of about 91,922 (250)
Agent-Based Simulations of Blockchain protocols illustrated via Kadena's Chainweb
While many distributed consensus protocols provide robust liveness and consistency guarantees under the presence of malicious actors, quantitative estimates of how economic incentives affect security are few and far between.
Chitra, Tarun+3 more
core +1 more source
N-Accesses: A Blockchain-Based Access Control Framework for Secure IoT Data Management
With the rapid advancement of network communication and big data technologies, the Internet of Things (IoT) has permeated every facet of our lives. Meanwhile, the interconnected IoT devices have generated a substantial volume of data, which possess both ...
Teng Hu+6 more
doaj +1 more source
An Improved Elegant Method to Re-initialize Hash Chains [PDF]
Hash chains are widely used in various cryptographic systems such as electronic micropayments and one-time passwords etc. However, hash chains suffer from the limitation that they have a finite number of links which when used up requires the system to re-
Daoben Li, Yuanchao Zhao
core
Ramanujan graphs in cryptography [PDF]
In this paper we study the security of a proposal for Post-Quantum Cryptography from both a number theoretic and cryptographic perspective. Charles-Goren-Lauter in 2006 [CGL06] proposed two hash functions based on the hardness of finding paths in ...
Costache, Anamaria+4 more
core +2 more sources
A Secure Communication Method Based on Message Hash Chain
Traditional network communication methods lack endogenous security mechanisms, which is the root cause of network security problems, e.g., spoofing identity and address forgery. This paper proposes a secure communication method based on the message hash chain, referred to as the chain communication method or MHC method. We use the message hash chain to
Mingxuan Han, Wenbao Jiang
openaire +2 more sources
Motivated by progress in the field of zero-knowledge proofs, so-called Arithmetization-Oriented (AO) symmetric primitives have started to appear in the literature, such as MiMC, Poseidon or Rescue.
Aurélien Boeuf+2 more
doaj +1 more source
A method to fabricate anisotropic SiO2 patchy microspheres is presented using a modified microcontact printing technique. This involves a PDMS elastomer stamp with grooved surface topography, creating a confined environment for the microspheres.
Martin Reifarth+10 more
wiley +1 more source
Energy-Efficient Hash Chain Traversal
A hash chain H for a one-way hash function h(·) is a sequence of hash values , where vn is a secret value, vi is generated by vi=h(vi+1) for i=n-1,n-2,...,0 an0d v0 is a public value. A hash chain traversal algorithm T computes and outputs the hash chain H, returning vi in time period (called round) i for 1≤i≤n.
Yum, DH, Seo, JW, Lee, PJ
openaire +3 more sources
IcebergHT: High Performance PMEM Hash Tables Through Stability and Low Associativity [PDF]
Modern hash table designs strive to minimize space while maximizing speed. The most important factor in speed is the number of cache lines accessed during updates and queries. This is especially important on PMEM, which is slower than DRAM and in which writes are more expensive than reads. This paper proposes two stronger design objectives: stability
arxiv
Blockchain‐Empowered H‐CPS Architecture for Smart Agriculture
This article reviews the current system architectures for smart agriculture and proposes a blockchain‐empowered hierarchical cyber‐physical system (H‐CPS) framework. It discusses the challenges and outlines future research directions, including the use of semantic blockchain to handle complex data and models.
Xiaoding Wang+8 more
wiley +1 more source