E Zarei Zefreh, M Abdali - Multimedia Tools and Applications, 2024 - Springer
The current paper proposes LSIE, a fast and secure Latin square-based image encryption scheme using SHA256 hash function and chaotic systems. LSIE uses a 3-tier architecture …
MR Hossan, FA Nirob, A Islam, TM Rakin… - IEEE …, 2024 - ieeexplore.ieee.org
Blockchain, a distributed and digital ledger technology, has the potential to transform several industries from cryptocurrencies to supply chains. However, the complexity of understanding …
In today's world, the Internet of Things (IoT) plays a major role to interconnect all the devices and improve the overall Quality of Life (QoL) for people. The main concern among IoT …
ZK-SNARKs, a fundamental component of privacyoriented payment systems, identity protocols, or anonymous voting systems, are advanced cryptographic protocols for verifiable …
To empower smart contracts with the promising capabilities of cryptography, Ethereum officially introduced a set of cryptographic APIs that facilitate basic cryptographic operations …
ZK-SNARKs are advanced cryptographic protocols used in private verifiable computation: modern SNARKs allow to encode the invariants of an arithmetic circuit over some large …
B Regalia, B Adams - arXiv preprint arXiv:2404.15632, 2024 - arxiv.org
The greatest advantage that Web3 applications offer over Web 2.0 is the evolution of the data access layer. Opaque, centralized services that compelled trust from users are replaced …