Results 61 to 70 of about 3,739 (238)

A Lyra2 FPGA Core for Lyra2REv2-Based Cryptocurrencies

open access: yes, 2019
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms and it is used as a proof-of-work function in several cryptocurrencies that aim to be ASIC-resistant.
Balatsoukas-Stimming, Alexios   +3 more
core   +1 more source

A Blockchain‐Driven Approach to Enhancing Transparency and Traceability in Organic Food Supply Chain Management

open access: yesApplied Computational Intelligence and Soft Computing, Volume 2026, Issue 1, 2026.
This paper proposes a novel blockchain‐based system designed to revolutionize transparency, traceability, and reliability within the organic food supply chain. Addressing persistent challenges such as certification fraud, opaque supply chains, and the high costs associated with organic food production, stakeholders including farmers, processors ...
Youness Riouali   +2 more
wiley   +1 more source

Hardware authentication based on PUFs and SHA-3 2nd round candidates [PDF]

open access: yes, 2010
Security features are getting a growing interest in microelectronics. Not only entities have to authenticate in the context of a high secure communication but also the hardware employed has to be trusted.
Baturone Castillo, María Iluminada   +1 more
core   +1 more source

Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley   +1 more source

Threshold Implementations in Software: Micro-architectural Leakages in Algorithms

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the ...
John Gaspoz, Siemen Dhooghe
doaj   +1 more source

Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems [PDF]

open access: yes, 2018
Decision of whether a Boolean equation system has a solution is an NPC problem and finding a solution is NP hard. In this paper, we present a quantum algorithm to decide whether a Boolean equation system FS has a solution and compute one if FS does have ...
Chen, Yu-Ao, Gao, Xiao-Shan
core   +1 more source

Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes [PDF]

open access: yes, 2012
International audienceIn this paper we present efficient implementations of McEliece variants using quasi-dyadic codes. We provide secure parameters for a classical McEliece encryption scheme based on quasi-dyadic generalized Srivastava codes, and ...
B. Biswas   +20 more
core   +3 more sources

EthVault: A Secure and Resource‐Conscious FPGA‐Based Ethereum Cold Wallet

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This work presents EthVault, the first hardware‐based Ethereum hierarchical deterministic cold wallet, featuring FPGA implementations of key cryptographic algorithms for secure key generation. A novel ECC architecture resilient to side‐channel and timing attacks, along with an efficient child key derivation function, are introduced. Implementation on a
Joel Poncha Lemayian   +3 more
wiley   +1 more source

Conditional Cube Attack on Round-Reduced ASCON

open access: yesIACR Transactions on Symmetric Cryptology, 2017
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. Ascon submitted by Dobraunig et al. is one of 16 survivors of the 3rd round CAESAR competition. The cube-like method is first used by Dinur et al.
Zheng Li, Xiaoyang Dong, Xiaoyun Wang
doaj   +1 more source

GPU Accelerated Keccak (SHA3) Algorithm

open access: yes, 2019
Hash functions like SHA-1 or MD5 are one of the most important cryptographic primitives, especially in the field of information integrity. Considering the fact that increasing methods have been proposed to break these hash algorithms, a competition for a new family of hash functions was held by the US National Institute of Standards and Technology ...
Wang, Canhui, Chu, Xiaowen
openaire   +2 more sources

Home - About - Disclaimer - Privacy