Analysis of the cryptographic tools for blockchain and bitcoin

V Gayoso Martinez, L Hernández-Álvarez… - Mathematics, 2020 - mdpi.com
Blockchain is one of the most interesting emerging technologies nowadays, with
applications ranging from cryptocurrencies to smart contracts. This paper presents a review …

[HTML][HTML] Integrity verification for digital Holy Quran verses using cryptographic hash function and compression

M Almazrooie, A Samsudin, AAA Gutub… - Journal of King Saud …, 2020 - Elsevier
Data Integrity is one of the primary concepts in information security. The main task of the
cryptographic hash function is to assure the integrity of the transmitted data. In this work …

An efficient approach for secure multi-party computation without authenticated channel

DH Vu, TD Luong, TB Ho - Information Sciences, 2020 - Elsevier
Secure multi-party sum is one of the most important secure multi-party computation
protocols. It has been widely applied to solve many privacy-preservation problems such as …

A study on nine years of bitcoin transactions: Understanding real-world behaviors of bitcoin miners and users

B Hou, F Chen - 2020 IEEE 40th international conference on …, 2020 - ieeexplore.ieee.org
Bitcoin is the world's first blockchain-based, peer-to-peer cryptocurrency system. Being
tremendously successful, the Bitcoin system is designed to support reliable, secure, and …

[图书][B] Cryptographic Primitives in Blockchain Technology: A Mathematical Introduction

A Bolfing - 2020 - books.google.com
Many online applications, especially in the financial industries, are running on blockchain
technologies in a decentralized manner, without the use of an authoritative entity or a trusted …

SSI-AWARE: Self-sovereign identity authenticated backup with auditing by remote entities

P Jakubeit, A Dercksen, A Peter - … Security Theory and Practice: 13th IFIP …, 2020 - Springer
The self-sovereign identity (SSI) model entails the full responsibility and sovereignty of a
user regarding his identity data. This identity data can contain private data which is solely …

A small subgroup attack on bitcoin address generation

M Sala, D Sogiorno, D Taufer - Mathematics, 2020 - mdpi.com
We show how a small subgroup confinement-like attack may be mounted on the Bitcoin
addresses generation protocol, by inspecting a special subgroup of the group associated to …

Secure MD4 Hash Function Using Henon

A Zellagui, N Hadj-Said… - Malaysian Journal of …, 2020 - journal.unisza.edu.my
Secure hash functions play a fundamental role in cryptographic and web applications. They
are mainly used, in the context of digital signatures, to verify the integrity and authenticity of …

Bitcoin blockchain steganographic analysis

AA Giron, JE Martina, R Custódio - … AIHWS, AIoTS, Cloud S&P, SCI, SecMT …, 2020 - Springer
Steganography has been used as a way to hide data in files or in messages traveling on
communication channels. Its use can be worrisome when it is used without proper …

Differential fault analysis of NORX

A Jana, D Saha, G Paul - Proceedings of the 4th ACM Workshop on …, 2020 - dl.acm.org
In recent literature, there has been a particular interest in studying nonce-based
Authenticated Encryption (AE) schemes in the light of fault-based attacks as they seem to …