Encryption in the past, present, and future : an honors thesis (HONRS 499) [PDF]
To ensure the confidentiality and integrity of data in storage and transit, various cryptography systems have been developed. Each of these systems has individual strengths and weaknesses.
Surma, Eric W.
core
Adoption and sustainability of bitcoin and the blockchain technology in Nigeria. [PDF]
Onyekwere E, Ogwueleka FN, Irhebhude ME.
europepmc +1 more source
An Implementation of Trust Chain Framework with Hierarchical Content Identifier Mechanism by Using Blockchain Technology. [PDF]
Chen HC +10 more
europepmc +1 more source
Automating Collision Attacks on RIPEMD-160 [PDF]
As an ISO/IEC standard, the hash function RIPEMD-160 has been used to generate the Bitcoin address with SHA-256. However, due to the complex double-branch structure of RIPEMD-160, the best collision attack only reaches 36 out of 80 steps of RIPEMD-160 ...
Fukang Liu, Gaoli Wang, Yingxin Li
core
Bitcoin Protocol Main Threats [PDF]
In this paper we explain the basics of Bitcoin protocol and the state of the art of the main attacks to it. We first present an overview of digital currencies, showing what they are and the social need they aim to satisfy.
Di Francesco Maesa, Damiano
core
Сравнительный анализ характеристик и принципов построения стандартов ЭЦП на свойствах эллиптических кривых [PDF]
Розглядаються державні та галузеві стандарти цифрового підпису, які використовують особливості еліптичних кривих. Обґрунтовуються умови необхідності введення більш криптографічно стійких алгоритмів. Робиться порівняльний аналіз прийнятих стандартів ЕЦП з
Кочубинский, Анатолий +1 more
core
Secure Covid-19 Electronic Health Records Management for Telediagnosis and Travel Ticket Assistant System Using Cryptographic Approaches. [PDF]
Falmari VR, Brindha M, Ko S.
europepmc +1 more source
A secure and decentralized SSI authentication protocol with privacy protection and fine-grained access control based on federated blockchain. [PDF]
Ma B +5 more
europepmc +1 more source
State-of-the-Art Software-Based Remote Attestation: Opportunities and Open Issues for Internet of Things. [PDF]
Ankergård SFJJ, Dushku E, Dragoni N.
europepmc +1 more source
Construction and Use Examples of Private Electronic Notary Service in Educational Institutions [PDF]
People have many documents. For example, a variety of documents are prepared and used in public institutions. As the internet becomes widely available in recent years, paper documents are being replaced with electronic data, which are often distributed ...
Dozono Hiroshi +4 more
core +1 more source

