Showing 61 - 80 results of 80 for search '"Crypto "', query time: 0.03s Refine Results
  1. 61

    Research of Hamming weight-based algebraic side-channel attack on LED by Ke-ke JI, Tao WANG, Shi-ze GUO, Xin-jie ZHAO, Hui-ying LIU

    Published 2013-07-01
    “…Secondly, the power leakages of LED on ATMEGA324P microcontroller were measured by a digital oscilloscope; some leakage points with obvious power patterns were chosen as the targeted points and used to deduce the Hamming weight via computing the Pearson correlation factor; satisfiability-based, Pseu-do-Boolean optimization-based, linear programming-based methods were used to representing Hamming weights with algebraic equations. Finally, the CryptoMinisat and the SCIP solver were applied to solve for the key and many attacks are conducted under different scenarios. …”
    Get full text
    Article
  2. 62

    Asymmetries in factors influencing non-fungible tokens’ (NFTs) returns by Botond Benedek, Bálint Zsolt Nagy

    Published 2025-01-01
    “…Therefore, the present study examines factors affecting NFT returns, from market-related factors (crypto-market index return and stock market index return) to the Amihud illiquidity ratio and Google search trends during different market conditions. …”
    Get full text
    Article
  3. 63

    A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis by Gao Wang, Gaoli Wang, Siwei Sun

    Published 2024-01-01
    “…At CRYPTO 2019, Gohr showed the significant advantages of neural distinguishers over traditional distinguishers in differential cryptanalysis. …”
    Get full text
    Article
  4. 64

    Sustainability and Environmental Impact of Mining and Maintaining Cryptocurrencies: A Review by D. Srinivasa Rao, Ch. Rajasekhar, P. M. K. Prasad and G. B. S. R. Naidu

    Published 2024-12-01
    “…This study presents the current scenario and trends of worldwide cryptocurrency growth and discusses the environmental impact of cryptocurrency mining. It explores crypto mining worldwide and provides a qualitative review. …”
    Get full text
    Article
  5. 65

    Formation of the TNI Cyber Force: A Strategic and Policy Analysis by Aris Sarjito

    Published 2024-11-01
    “…The purpose of this study is to analyze the policy and strategy for the formation of the TNI Cyber Force and evaluate the synergy between institutions, especially with the National Cyber ​​and Crypto Agency (BSSN). This study uses a qualitative method with a secondary data analysis approach, including reports from Fortinet, AwanPintar.id, and national policy documents related to cybersecurity. …”
    Get full text
    Article
  6. 66

    Effects of Cryptocurrencies on Global Economics: A Review Study by Rogash Younis Masiha

    Published 2022-07-01
    “…And the trend towards investing in crypto and digital currencies on the part of investors, in conjunction with the competition of countries around the world to win the issuance of the first digital currency issued by central banks. …”
    Get full text
    Article
  7. 67

    INTERNATIONAL MEASURES TO COUNTERACT THE LAUNDERING OF ILLEGAL INCOME OF THE FIFTH GENERATION – LEGAL CONDITIONS FOR STRENGTHENING THE SECURITY OF THE FINANCIAL MARKET by I. V. Vashchekina, A. N. Vashchekin

    Published 2021-02-01
    “…The legal entities covered by the restrictive and control measures now include crypto exchange platforms, virtual wallet providers, as well as firms that provide currency exchange services. …”
    Get full text
    Article
  8. 68

    Hayekian Hurdles: Challenges to Cryptocurrency as a Viable Basis for a New Monetary Order by Luís Pedro Freitas, Jorge Cerdeira, Diogo Lourenço

    Published 2025-01-01
    “…However, recent developments, including market volatility and the collapse of key exchanges like FTX, have eroded public trust, raising skepticism of a feasible transition to a crypto-based monetary system. This paper explores why cryptocurrencies have not met the expectations of their proponents, particularly those who saw them as a step towards Friedrich Hayek’s vision for competitive currency issuance. …”
    Get full text
    Article
  9. 69

    A Regev-Type Fully Homomorphic Encryption Scheme Using Modulus Switching by Zhigang Chen, Jian Wang, Liqun Chen, Xinxia Song

    Published 2014-01-01
    “…On the other hand, as a case study, we modify the Brakerski FHE scheme (in Crypto 2012) by using the modulus switching technique. …”
    Get full text
    Article
  10. 70

    Revocable identity‐based matchmaking encryption in the standard model by Zhe Jiang, Xiwen Wang, Kai Zhang, Junqing Gong, Jie Chen, Haifeng Qian

    Published 2023-07-01
    “…Abstract Identity‐based Matchmaking Encryption (IB‐ME) is an extension notion of matchmaking encryption (CRYPTO 2019), where a sender and a receiver can specify an access policy for the other party. …”
    Get full text
    Article
  11. 71

    Powering perception, echoing green voices: The interplay of Cryptocurrency's energy footprint and environmental discourse in steering the direction of the market by Iheb Ghazouani, Ines Ghazouani, Abdelwahed Omri

    Published 2024-12-01
    “…Moreover, real electricity use has a more pronounced impact than social media discussions on both Bitcoin and Ethereum volatility. This indicates that crypto market investors prioritize real-world indicators over information from social media discussions. …”
    Get full text
    Article
  12. 72

    Decentralisation and beyond: The impact of blockchain on global economies, banking, and governance by Sharma Mohit, Patidar Sanjay

    Published 2024-01-01
    “…This research explores two primary areas: the sustainability of crypto exchange systems and blockchain's governance implications in our digital economy. …”
    Get full text
    Article
  13. 73

    Survey on Ethereum phishing detection technology by Zhao CAI, Tao JING, Shuang REN

    Published 2023-04-01
    “…With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high degree of deception and concealment, causing significant losses to both users and businesses.Ethereum platform, with its smart contract functionality, has attracted many crypto currency investors.However, this widespread popularity has also attracted an influx of criminals, leading to the rise of cybercrime activities.Among them, phishing scams are one of the main forms of fraud on the Ethereum platform.To tackle this issue, researchers have developed Ethereum network phishing identification technology, achieving significant progress in this field.However, there has been relatively little systematic analysis and summary of these research results.The current state of phishing fraud on the Ethereum network was analyzed.Moreover, a comprehensive summary of existing phishing detection datasets and evaluation metrics were provided.On this basis, methods for detecting phishing on Ethereum were reviewed, including those based on transaction information, graph embedding and graph neural networks.Transaction information-based methods are the most common, analyzing information such as input and output addresses and amounts in transaction data to determine whether a transaction is abnormal.Methods based on graph embedding and graph neural networks place more emphasis on analyzing the entire transaction network, constructing a graph structure to analyze the relationships between nodes, and more accurately identifying phishing attacks.In addition, a comparative analysis of the advantages and disadvantages of various methods was conducted, explaining the applicability and limitations of each method.Finally, the challenges facing Ethereum phishing detection were pointed out, and the future research trends for Ethereum phishing detection were predicted.…”
    Get full text
    Article
  14. 74

    Effects of perfluorolauric acid exposure on intestinal microbial community and physiological health indicators in mice by Jiaqiong Zhang, Lingli Min, Jiamin Chang, Siqi Ding, Yulang Chi, Shuhua Wang, Shouping Ji

    Published 2025-01-01
    “…Moreover, PFLA led to a decrease in α diversity of the gut microbiota, with certain specific species such as CryptoBacteroides significantly increasing in the PFLA group while Odoribacter_laneus decreased. …”
    Get full text
    Article
  15. 75

    Technical, forensic and organisational aspects of work with Monero cryptocurrency by V. V. Nosov, O. V. Manzhai, V. O. Kovtun

    Published 2023-09-01
    “…At the same time, there are effective mechanisms for documenting traces of work with the Monero payment system and proven methods for extracting passphrases to crypto-wallets and other sensitive information on the movement of funds in the Monero system from computer equipment.…”
    Get full text
    Article
  16. 76

    A Low-Overhead and High-Security Scan Design Based on Scan Obfuscation by Weizheng Wang, Xingxing Gong, Shuo Cai, Jiamin Liu, Xiangqi Wang

    Published 2024-01-01
    “…In these attacks, attackers can use scan chains inside a chip to obtain internal sensitive information of the chip, such as crypto key or other secret data. To counteract scan-based side-channel attacks, various secure strategies have been put forward by researchers, but they generally exist some flaws. …”
    Get full text
    Article
  17. 77

    Crise du sport scolaire et universitaire au Sénégal : des conflits personnels et institutionnels aux carences financières, infrastructurelles et organisationnelles by Mouhamed Dit Momar Talla NDONGO, Danty Patrick DIOMPY, Souleymane DIALLO

    Published 2023-11-01
    “…Cette absence de démocratisation est étroitement liée à la primauté d’intérêts financiers crypto-personnels. A cela s’ajoutent une insuffisance des ressources allouées à la base et des carences infrastructurelles et organisationnelles. …”
    Get full text
    Article
  18. 78

    Further accelerating the search of differential characteristics based on the SAT method by Zheng XU

    Published 2022-10-01
    “…Sun et al.’s method of using Matsui’s bounding conditions to accelerate the search of differential characteristics was reviewed.Matsui’s boundary conditions and Sun et al.’s method of using Matsui’s bounding conditions to accelerate the search of differential characteristics were improved for better search efficiency.Then an improved method to search for the optimal differential characteristics in block ciphers was proposed.Besides, the accelerating effects of the number of threads and the query condition were investigated, and a strategy for choosing the number of threads and the query condition were proposed.STP and CryptoMiniSat were used to search for 8-round SPECK96 differential characteristics with probabilities of 2<sup>- 24</sup>, 2<sup>- 25</sup>, 2<sup>- 26</sup>and 11-round HIGHT differential characteristics with a probability of 2<sup>- 39</sup>, then the time-consuming of solving SAT/SMT problems under different number of threads and query conditions were compared.It was found that the number of threads has a great effect on the time consumption of searching for differential characteristics, while the query condition may have little effect on the time consumption of searching for differential characteristics.Then, a strategy on how to select the number of threads and the query condition was proposed.Furthermore, it was found that STP can affect the overall efficiency of the search.According to the proposed strategy, the 11-round optimal differential characteristics of HIGHT were searched by using the improved bounding conditions and improved method.A tight bound for the probability of the 11-round optimal differential characteristics of HIGHT was obtained for the first time, i.e.2<sup>- 45</sup>.To the best of our knowledge, the existing tightest bound of the optimal 11-round HIGHT is <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <msubsup> <mi>P</mi> <mrow> <mtext>Opt</mtext></mrow> <mrow> <mn>11</mn></mrow> </msubsup> <mo>≥</mo><msup> <mn>2</mn> <mrow> <mo>−</mo><mn>45</mn></mrow> </msup> </math></inline-formula> .This means that using the existing tightest bound of the optimal 11-round HIGHT cannot give an accurate evaluation of the security of 11-round HIGHT against differential cryptanalysis.Therefore, the result is the best-known result.…”
    Get full text
    Article
  19. 79

    Generalized Centered Binomial Distribution for Bimodal Lattice Signatures by Seungwoo Lee, Joo Woo, Jonghyun Kim, Jong Hwan Park

    Published 2025-01-01
    “…In CRYPTO 2013, Ducas et al. introduced a bimodal discrete Gaussian distribution into the Fiat-Shamir with abort paradigm, proposing a signature scheme called BLISS, which significantly improved rejection sampling efficiency and reduced the number of required abort steps compared to all previously proposed (uni-modal) lattice-based signature schemes. …”
    Get full text
    Article
  20. 80

    Prioritas Investasi Keamanan Informasi Menggunakan Analytic Network Process (ANP) Bagi Pemerintah Daerah Provinsi Kalimantan Tengah by Ruby Haris, Alva Hendi Muhammad, Asro Nasiri

    Published 2024-12-01
    “…Although there have been initiatives from the Central Government, such as the Information Security Index (KAMI) introduced by the National Cyber and Crypto Agency (BSSN), implementation at the regional level still faces various challenges. …”
    Get full text
    Article