[PDF][PDF] A survey on consortium blockchain consensus mechanisms

W Yao, J Ye, R Murimi, G Wang - arXiv preprint arXiv:2102.12058, 2021 - academia.edu
Blockchain is a distributed ledger that is decentralized, immutable, and transparent, which
maintains a continuously growing list of transaction records ordered into blocks. As the core …

A high-efficiency FPGA-based multimode SHA-2 accelerator

HL Pham, TH Tran, VTD Le, Y Nakashima - IEEE Access, 2022 - ieeexplore.ieee.org
The secure hash algorithm 2 (SHA-2) family, including the SHA-224/256/384/512 hash
functions, is widely adopted in many modern domains, ranging from Internet of Things …

Complete knowledge: Preventing encumbrance of cryptographic secrets

M Kelkar, K Babel, P Daian, J Austgen… - Proceedings of the …, 2024 - dl.acm.org
Most cryptographic protocols model a player's knowledge of secrets in a simple way.
Informally, the player knows a secret in the sense that she can directly furnish it as a (private) …

A high-performance multimem SHA-256 accelerator for society 5.0

TH Tran, HL Pham, Y Nakashima - IEEE Access, 2021 - ieeexplore.ieee.org
The development of a low-cost high-performance secure hash algorithm (SHA)-256
accelerator has recently received extensive interest because SHA-256 is important in …

[HTML][HTML] Energy Consumption by Cryptocurrency: A Bibliometric Analysis Revealing Research Trends and Insights

V Anandhabalaji, M Babu, R Brintha - Energy Nexus, 2024 - Elsevier
Cryptocurrency is rapidly emerging as a prominent player in the global financial system,
characterized by its decentralized nature and the absence of centralized government …

BCA: A 530-mW multicore blockchain accelerator for power-constrained devices in securing decentralized networks

TH Tran, HL Pham, TD Phan… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Blockchain distributed ledger technology (DLT) has widespread applications in society 5.0
because it improves service efficiency and significantly reduces labor costs. However …

A Comprehensive analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges

D Ramakrishna, MA Shaik - IEEE Access, 2024 - ieeexplore.ieee.org
Cryptographic techniques are reviewed in this literature study, with particular attention paid
to their applicability, Importance, contributions, And field strengths. These algorithms include …

A coarse grained reconfigurable architecture for sha-2 acceleration

HL Pham, TH Tranl, VTD Le… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The development of high-speed SHA-2 hardware with high flexibility is urgently needed
because SHA-2 functions are widely employed in numerous fields, from loT devices to cryp …

A new message expansion structure for full pipeline SHA-2

Y Zhang, Z He, M Wan, M Zhan… - … on Circuits and …, 2021 - ieeexplore.ieee.org
Once there are constant or infrequently changed bits (COIBs) in two adjacent input
messages of SHA-2, the switching power of input messages data registers (IMD-REGs) used …

Efficient architectures for full hardware scrypt-based block hashing system

DK Lam, VTD Le, TH Tran - Electronics, 2022 - mdpi.com
The password-based key derivation function Scrypt has been employed for many services
and applications due to its protection ability. It has also been employed as a proof-of-work …