[HTML][HTML] Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA

A Sevin, AA Osman Mohammed - Applied Sciences, 2024 - mdpi.com
Blockchain has several unique features: data integrity, security, privacy, and immutability.
For this reason, it is considered one of the most promising new technologies for a wide …

Efficient authentication framework with Blake2s and a hash-based signature scheme for Industry 4.0 applications

P Tandel, J Nasriwala - International Journal of Intelligent …, 2024 - inderscienceonline.com
Industry 4.0, the new production standard, integrates small to medium-level devices for
efficient automation. Secure communication among these devices requires protection from …

MRCA 2.0: Area-Optimized Multi-grained Reconfigurable Cryptographic Accelerator for Securing Blockchain-based IoT Systems

HL Pham, VTD Le, TH Vu, TD Tran, Y Nakashima - IEEE Micro, 2024 - ieeexplore.ieee.org
This paper introduces a multi-grained reconfigurable cryptographic accelerator 2.0 (MRCA
2.0), upgrading from the first 8/32/64-bit CGRA named MRCA, to offer high performance with …

Evaluation of Hash Algorithm Performance for Cryptocurrency Exchanges Based on Blockchain System

ACH Chen - arXiv preprint arXiv:2408.11950, 2024 - arxiv.org
The blockchain system has emerged as one of the focal points of research in recent years,
particularly in applications and services such as cryptocurrencies and smart contracts. In this …

MRCA: Multi-grained Reconfigurable Cryptographic Accelerator for Diverse Security Requirements

PH Luan, HH Nguyen, VTD Le, TD Tran… - … IEEE Symposium in …, 2024 - ieeexplore.ieee.org
In today's digital security, the robust 64-bit cryptographic algorithms are key to fulfilling strict
security standards. However, most existing cryptographic architectures primarily support …

High-efficiency Reconfigurable Crypto Accelerator Utilizing Innovative Resource Sharing and Parallel Processing

VTD Le, HL Pham, TH Tran, TS Duong… - 2023 IEEE 16th …, 2023 - ieeexplore.ieee.org
In decentralized IoT ecosystems, four cryptographic algorithms, including SHA256,
BLAKE256, BLAKE2s, and Chacha20, are principal to ensure data integrity and …

Report on Hash Algorithm Performance─ A Case Study of Cryptocurrency Exchanges Based on Blockchain System

ACH Chen - 2024 5th International Conference on Data …, 2024 - ieeexplore.ieee.org
The blockchain system has emerged as one of the focal points of research in recent years,
particularly in applications and services such as cryptocurrencies and smart contracts. In this …

Hator: A High-Efficiency CGRA-Based 32/64-Bit Hashing Accelerator with Real-Time Performance Analysis

HH Nguyen, PH Luan, TH Vu, VTD Le… - 2024 IEEE 17th …, 2024 - ieeexplore.ieee.org
Developing hashing hardware to support diverse 32-bit and 64-bit hash functions at high
speed and with low power consumption is necessary to meet the varied security …

Universal 32/64-bit CGRA for Lightweight Cryptography in Securing IoT Data Transmission

SD Thi, HL Pham, VTD Le, TD Tran… - 2023 IEEE 16th …, 2023 - ieeexplore.ieee.org
National Institute of Standards and Technology (NIST) has standardized ten lightweight
cryptography (LWC) algorithms for efficient data protection in IoT, often implemented in …

Efficient Cloud Data Deduplication with Blake3 and Secure Transfer using AES

K Tajane, R Pitale, S Zambre, H Huda… - 2024 4th …, 2024 - ieeexplore.ieee.org
This research introduces an integrated approach for enhancing file security by combining
file deduplication and Advanced Encryption Standard (AES) encryption. The efficient Blake3 …