Cryptographic competitions

DJ Bernstein - Journal of Cryptology, 2024 - Springer
Cryptographic Competitions | Journal of Cryptology Skip to main content SpringerLink Account
Menu Find a journal Publish with us Search Cart 1.Home 2.Journal of Cryptology 3.Article …

LSIE: a fast and secure Latin square-based image encryption scheme

E Zarei Zefreh, M Abdali - Multimedia Tools and Applications, 2024 - Springer
The current paper proposes LSIE, a fast and secure Latin square-based image encryption
scheme using SHA256 hash function and chaotic systems. LSIE uses a 3-tier architecture …

A Comprehensive Analysis of Blockchain Technology and Consensus Protocols Across Multilayered Framework

MR Hossan, FA Nirob, A Islam, TM Rakin… - IEEE …, 2024 - ieeexplore.ieee.org
Blockchain, a distributed and digital ledger technology, has the potential to transform several
industries from cryptocurrencies to supply chains. However, the complexity of understanding …

Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks

S Pandey, B Bhushan - Wireless Networks, 2024 - Springer
In today's world, the Internet of Things (IoT) plays a major role to interconnect all the devices
and improve the overall Quality of Life (QoL) for people. The main concern among IoT …

On Efficient and Secure Compression Functions for Arithmetization-Oriented Hashing

E Andreeva, R Bhattacharyya, A Roy… - 2024 IEEE 37th …, 2024 - computer.org
ZK-SNARKs, a fundamental component of privacyoriented payment systems, identity
protocols, or anonymous voting systems, are advanced cryptographic protocols for verifiable …

When Contracts Meets Crypto: Exploring Developers' Struggles with Ethereum Cryptographic APIs

J Zhang, J Chen, Z Wan, T Chen, J Gao… - Proceedings of the IEEE …, 2024 - dl.acm.org
To empower smart contracts with the promising capabilities of cryptography, Ethereum
officially introduced a set of cryptographic APIs that facilitate basic cryptographic operations …

On Efficient and Secure Compression Modes for Arithmetization-Oriented Hashing

E Andreeva, R Bhattacharyya, A Roy… - Cryptology ePrint …, 2024 - eprint.iacr.org
ZK-SNARKs are advanced cryptographic protocols used in private verifiable computation:
modern SNARKs allow to encode the invariants of an arithmetic circuit over some large …

Non-Fungible Programs: Private Full-Stack Applications for Web3

B Regalia, B Adams - arXiv preprint arXiv:2404.15632, 2024 - arxiv.org
The greatest advantage that Web3 applications offer over Web 2.0 is the evolution of the
data access layer. Opaque, centralized services that compelled trust from users are replaced …