Results 91 to 100 of about 2,808 (186)
SwarmAd: A decentralised content management system
Swarm ad is a system that allows creating online communites while guaranteeing: (1) a completely decentralised architecture, (2) automated management, (3) data safety and (4) data sovereignety. Abstract Online presence is becoming an important part of everyday's life and online communities may represent a significant source of engagement for the ...
Tommaso Baldo, Mauro Migliardi
wiley +1 more source
A survey on post‐quantum based approaches for edge computing security
The distribution of reviewed papers by focused area. Abstract With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high‐speed processing is that its existing systems cause security vulnerabilities ...
Aykut Karakaya, Ahmet Ulu
wiley +1 more source
Throughput Optimum Architecture of KECCAK Hash Function
Because of the weakening of the widely-used SHA-1 hash algorithm and concerns over the similarly-structured algorithms of the SHA-2 family; the US NIST has initiated the SHA-3 contest in order to select a suitable drop-in replacement. In this paper we use the unrolling method to describe the high-speed hardware implementation of the SHA-3 hash function
A. Gholipour, S. Mirzakuchaki
openaire +1 more source
Superposition Attacks on Pseudorandom Schemes Based on Two or Less Permutations
We study quantum superposition attacks against permutation‐based pseudorandom cryptographic schemes. We first extend Kuwakado and Morii’s attack against the Even–Mansour cipher and exhibit key recovery attacks against a large class of pseudorandom schemes based on a single call to an n‐bit permutation, with polynomial O(n) (or O(n2), if the concrete ...
Shaoxuan Zhang +3 more
wiley +1 more source
New techniques for trail bounds and application to differential trails in Keccak
We present new techniques to efficiently scan the space of high-probability differential trails in bit-oriented ciphers. Differential trails consist in sequences of state patterns that we represent as ordered lists of basic components in order to arrange
Silvia Mella +2 more
doaj +1 more source
Elliptic‐Curve Cryptography Implementation on RISC‐V Processors for Internet of Things Applications
Elliptic‐curve cryptography (ECC) is a popular technique of public‐key cryptography used for secure communications in Internet of Things (IoT) applications. In this study, the implementation and analyze the Elliptic Curve Digital Signature Algorithm (ECDSA) with NIST‐256 on MicroBlaze processors based on RISC‐V architecture. This implementation aims to
Preethi Preethi +6 more
wiley +1 more source
PDFS: Practical Data Feed Service for Smart Contracts
Smart contracts are a new paradigm that emerged with the rise of the blockchain technology. They allow untrusting parties to arrange agreements. These agreements are encoded as a programming language code and deployed on a blockchain platform, where all ...
D Bayer +6 more
core +1 more source
Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}
With the standardization of NIST post-quantum cryptographic (PQC) schemes, optimizing these PQC schemes across various platforms presents significant research value. While most existing software implementation efforts have concentrated on ARM platforms,
Jipeng Zhang +3 more
doaj +1 more source
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area [PDF]
Secure data transfer has been the most challenging task for Internet of Things (IoT) devices. Data integrity must be ensured before and after the data transmission.
Lim , Yen Ruen
core
An Alternative Paradigm for Developing and Pricing Storage on Smart Contract Platforms
Smart contract platforms facilitate the development of important and diverse distributed applications in a simple manner. This simplicity stems from the inherent utility of employing the state of smart contracts to store, query and verify the validity of
Patsonakis, Christos, Roussopoulos, Mema
core +1 more source

