Results 51 to 60 of about 91,922 (250)

Agent-Based Simulations of Blockchain protocols illustrated via Kadena's Chainweb

open access: yes, 2019
While many distributed consensus protocols provide robust liveness and consistency guarantees under the presence of malicious actors, quantitative estimates of how economic incentives affect security are few and far between.
Chitra, Tarun   +3 more
core   +1 more source

N-Accesses: A Blockchain-Based Access Control Framework for Secure IoT Data Management

open access: yesSensors, 2023
With the rapid advancement of network communication and big data technologies, the Internet of Things (IoT) has permeated every facet of our lives. Meanwhile, the interconnected IoT devices have generated a substantial volume of data, which possess both ...
Teng Hu   +6 more
doaj   +1 more source

An Improved Elegant Method to Re-initialize Hash Chains [PDF]

open access: yes, 2005
Hash chains are widely used in various cryptographic systems such as electronic micropayments and one-time passwords etc. However, hash chains suffer from the limitation that they have a finite number of links which when used up requires the system to re-
Daoben Li, Yuanchao Zhao
core  

Ramanujan graphs in cryptography [PDF]

open access: yes, 2018
In this paper we study the security of a proposal for Post-Quantum Cryptography from both a number theoretic and cryptographic perspective. Charles-Goren-Lauter in 2006 [CGL06] proposed two hash functions based on the hardness of finding paths in ...
Costache, Anamaria   +4 more
core   +2 more sources

A Secure Communication Method Based on Message Hash Chain

open access: yesApplied Sciences, 2022
Traditional network communication methods lack endogenous security mechanisms, which is the root cause of network security problems, e.g., spoofing identity and address forgery. This paper proposes a secure communication method based on the message hash chain, referred to as the chain communication method or MHC method. We use the message hash chain to
Mingxuan Han, Wenbao Jiang
openaire   +2 more sources

Propagation of Subspaces in Primitives with Monomial Sboxes: Applications to Rescue and Variants of the AES

open access: yesIACR Transactions on Symmetric Cryptology, 2023
Motivated by progress in the field of zero-knowledge proofs, so-called Arithmetization-Oriented (AO) symmetric primitives have started to appear in the literature, such as MiMC, Poseidon or Rescue.
Aurélien Boeuf   +2 more
doaj   +1 more source

Regioselective and Anisotropic Multi‐Patching of Small Microparticles via a Polymer Brush‐Assisted Microcontact Printing (µCP)

open access: yesAdvanced Functional Materials, EarlyView.
A method to fabricate anisotropic SiO2 patchy microspheres is presented using a modified microcontact printing technique. This involves a PDMS elastomer stamp with grooved surface topography, creating a confined environment for the microspheres.
Martin Reifarth   +10 more
wiley   +1 more source

Energy-Efficient Hash Chain Traversal

open access: yesIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011
A hash chain H for a one-way hash function h(·) is a sequence of hash values , where vn is a secret value, vi is generated by vi=h(vi+1) for i=n-1,n-2,...,0 an0d v0 is a public value. A hash chain traversal algorithm T computes and outputs the hash chain H, returning vi in time period (called round) i for 1≤i≤n.
Yum, DH, Seo, JW, Lee, PJ
openaire   +3 more sources

IcebergHT: High Performance PMEM Hash Tables Through Stability and Low Associativity [PDF]

open access: yesarXiv, 2022
Modern hash table designs strive to minimize space while maximizing speed. The most important factor in speed is the number of cache lines accessed during updates and queries. This is especially important on PMEM, which is slower than DRAM and in which writes are more expensive than reads. This paper proposes two stronger design objectives: stability
arxiv  

Blockchain‐Empowered H‐CPS Architecture for Smart Agriculture

open access: yesAdvanced Science, EarlyView.
This article reviews the current system architectures for smart agriculture and proposes a blockchain‐empowered hierarchical cyber‐physical system (H‐CPS) framework. It discusses the challenges and outlines future research directions, including the use of semantic blockchain to handle complex data and models.
Xiaoding Wang   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy