-
61
Research of Hamming weight-based algebraic side-channel attack on LED
Published 2013-07-01“…Secondly, the power leakages of LED on ATMEGA324P microcontroller were measured by a digital oscilloscope; some leakage points with obvious power patterns were chosen as the targeted points and used to deduce the Hamming weight via computing the Pearson correlation factor; satisfiability-based, Pseu-do-Boolean optimization-based, linear programming-based methods were used to representing Hamming weights with algebraic equations. Finally, the CryptoMinisat and the SCIP solver were applied to solve for the key and many attacks are conducted under different scenarios. …”
Get full text
Article -
62
Asymmetries in factors influencing non-fungible tokens’ (NFTs) returns
Published 2025-01-01“…Therefore, the present study examines factors affecting NFT returns, from market-related factors (crypto-market index return and stock market index return) to the Amihud illiquidity ratio and Google search trends during different market conditions. …”
Get full text
Article -
63
A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis
Published 2024-01-01“…At CRYPTO 2019, Gohr showed the significant advantages of neural distinguishers over traditional distinguishers in differential cryptanalysis. …”
Get full text
Article -
64
Sustainability and Environmental Impact of Mining and Maintaining Cryptocurrencies: A Review
Published 2024-12-01“…This study presents the current scenario and trends of worldwide cryptocurrency growth and discusses the environmental impact of cryptocurrency mining. It explores crypto mining worldwide and provides a qualitative review. …”
Get full text
Article -
65
Formation of the TNI Cyber Force: A Strategic and Policy Analysis
Published 2024-11-01“…The purpose of this study is to analyze the policy and strategy for the formation of the TNI Cyber Force and evaluate the synergy between institutions, especially with the National Cyber and Crypto Agency (BSSN). This study uses a qualitative method with a secondary data analysis approach, including reports from Fortinet, AwanPintar.id, and national policy documents related to cybersecurity. …”
Get full text
Article -
66
Effects of Cryptocurrencies on Global Economics: A Review Study
Published 2022-07-01“…And the trend towards investing in crypto and digital currencies on the part of investors, in conjunction with the competition of countries around the world to win the issuance of the first digital currency issued by central banks. …”
Get full text
Article -
67
INTERNATIONAL MEASURES TO COUNTERACT THE LAUNDERING OF ILLEGAL INCOME OF THE FIFTH GENERATION – LEGAL CONDITIONS FOR STRENGTHENING THE SECURITY OF THE FINANCIAL MARKET
Published 2021-02-01“…The legal entities covered by the restrictive and control measures now include crypto exchange platforms, virtual wallet providers, as well as firms that provide currency exchange services. …”
Get full text
Article -
68
Hayekian Hurdles: Challenges to Cryptocurrency as a Viable Basis for a New Monetary Order
Published 2025-01-01“…However, recent developments, including market volatility and the collapse of key exchanges like FTX, have eroded public trust, raising skepticism of a feasible transition to a crypto-based monetary system. This paper explores why cryptocurrencies have not met the expectations of their proponents, particularly those who saw them as a step towards Friedrich Hayek’s vision for competitive currency issuance. …”
Get full text
Article -
69
A Regev-Type Fully Homomorphic Encryption Scheme Using Modulus Switching
Published 2014-01-01“…On the other hand, as a case study, we modify the Brakerski FHE scheme (in Crypto 2012) by using the modulus switching technique. …”
Get full text
Article -
70
Revocable identity‐based matchmaking encryption in the standard model
Published 2023-07-01“…Abstract Identity‐based Matchmaking Encryption (IB‐ME) is an extension notion of matchmaking encryption (CRYPTO 2019), where a sender and a receiver can specify an access policy for the other party. …”
Get full text
Article -
71
Powering perception, echoing green voices: The interplay of Cryptocurrency's energy footprint and environmental discourse in steering the direction of the market
Published 2024-12-01“…Moreover, real electricity use has a more pronounced impact than social media discussions on both Bitcoin and Ethereum volatility. This indicates that crypto market investors prioritize real-world indicators over information from social media discussions. …”
Get full text
Article -
72
Decentralisation and beyond: The impact of blockchain on global economies, banking, and governance
Published 2024-01-01“…This research explores two primary areas: the sustainability of crypto exchange systems and blockchain's governance implications in our digital economy. …”
Get full text
Article -
73
Survey on Ethereum phishing detection technology
Published 2023-04-01“…With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high degree of deception and concealment, causing significant losses to both users and businesses.Ethereum platform, with its smart contract functionality, has attracted many crypto currency investors.However, this widespread popularity has also attracted an influx of criminals, leading to the rise of cybercrime activities.Among them, phishing scams are one of the main forms of fraud on the Ethereum platform.To tackle this issue, researchers have developed Ethereum network phishing identification technology, achieving significant progress in this field.However, there has been relatively little systematic analysis and summary of these research results.The current state of phishing fraud on the Ethereum network was analyzed.Moreover, a comprehensive summary of existing phishing detection datasets and evaluation metrics were provided.On this basis, methods for detecting phishing on Ethereum were reviewed, including those based on transaction information, graph embedding and graph neural networks.Transaction information-based methods are the most common, analyzing information such as input and output addresses and amounts in transaction data to determine whether a transaction is abnormal.Methods based on graph embedding and graph neural networks place more emphasis on analyzing the entire transaction network, constructing a graph structure to analyze the relationships between nodes, and more accurately identifying phishing attacks.In addition, a comparative analysis of the advantages and disadvantages of various methods was conducted, explaining the applicability and limitations of each method.Finally, the challenges facing Ethereum phishing detection were pointed out, and the future research trends for Ethereum phishing detection were predicted.…”
Get full text
Article -
74
Effects of perfluorolauric acid exposure on intestinal microbial community and physiological health indicators in mice
Published 2025-01-01“…Moreover, PFLA led to a decrease in α diversity of the gut microbiota, with certain specific species such as CryptoBacteroides significantly increasing in the PFLA group while Odoribacter_laneus decreased. …”
Get full text
Article -
75
Technical, forensic and organisational aspects of work with Monero cryptocurrency
Published 2023-09-01“…At the same time, there are effective mechanisms for documenting traces of work with the Monero payment system and proven methods for extracting passphrases to crypto-wallets and other sensitive information on the movement of funds in the Monero system from computer equipment.…”
Get full text
Article -
76
A Low-Overhead and High-Security Scan Design Based on Scan Obfuscation
Published 2024-01-01“…In these attacks, attackers can use scan chains inside a chip to obtain internal sensitive information of the chip, such as crypto key or other secret data. To counteract scan-based side-channel attacks, various secure strategies have been put forward by researchers, but they generally exist some flaws. …”
Get full text
Article -
77
Crise du sport scolaire et universitaire au Sénégal : des conflits personnels et institutionnels aux carences financières, infrastructurelles et organisationnelles
Published 2023-11-01“…Cette absence de démocratisation est étroitement liée à la primauté d’intérêts financiers crypto-personnels. A cela s’ajoutent une insuffisance des ressources allouées à la base et des carences infrastructurelles et organisationnelles. …”
Get full text
Article -
78
Further accelerating the search of differential characteristics based on the SAT method
Published 2022-10-01“…Sun et al.’s method of using Matsui’s bounding conditions to accelerate the search of differential characteristics was reviewed.Matsui’s boundary conditions and Sun et al.’s method of using Matsui’s bounding conditions to accelerate the search of differential characteristics were improved for better search efficiency.Then an improved method to search for the optimal differential characteristics in block ciphers was proposed.Besides, the accelerating effects of the number of threads and the query condition were investigated, and a strategy for choosing the number of threads and the query condition were proposed.STP and CryptoMiniSat were used to search for 8-round SPECK96 differential characteristics with probabilities of 2<sup>- 24</sup>, 2<sup>- 25</sup>, 2<sup>- 26</sup>and 11-round HIGHT differential characteristics with a probability of 2<sup>- 39</sup>, then the time-consuming of solving SAT/SMT problems under different number of threads and query conditions were compared.It was found that the number of threads has a great effect on the time consumption of searching for differential characteristics, while the query condition may have little effect on the time consumption of searching for differential characteristics.Then, a strategy on how to select the number of threads and the query condition was proposed.Furthermore, it was found that STP can affect the overall efficiency of the search.According to the proposed strategy, the 11-round optimal differential characteristics of HIGHT were searched by using the improved bounding conditions and improved method.A tight bound for the probability of the 11-round optimal differential characteristics of HIGHT was obtained for the first time, i.e.2<sup>- 45</sup>.To the best of our knowledge, the existing tightest bound of the optimal 11-round HIGHT is <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <msubsup> <mi>P</mi> <mrow> <mtext>Opt</mtext></mrow> <mrow> <mn>11</mn></mrow> </msubsup> <mo>≥</mo><msup> <mn>2</mn> <mrow> <mo>−</mo><mn>45</mn></mrow> </msup> </math></inline-formula> .This means that using the existing tightest bound of the optimal 11-round HIGHT cannot give an accurate evaluation of the security of 11-round HIGHT against differential cryptanalysis.Therefore, the result is the best-known result.…”
Get full text
Article -
79
Generalized Centered Binomial Distribution for Bimodal Lattice Signatures
Published 2025-01-01“…In CRYPTO 2013, Ducas et al. introduced a bimodal discrete Gaussian distribution into the Fiat-Shamir with abort paradigm, proposing a signature scheme called BLISS, which significantly improved rejection sampling efficiency and reduced the number of required abort steps compared to all previously proposed (uni-modal) lattice-based signature schemes. …”
Get full text
Article -
80
Prioritas Investasi Keamanan Informasi Menggunakan Analytic Network Process (ANP) Bagi Pemerintah Daerah Provinsi Kalimantan Tengah
Published 2024-12-01“…Although there have been initiatives from the Central Government, such as the Information Security Index (KAMI) introduced by the National Cyber and Crypto Agency (BSSN), implementation at the regional level still faces various challenges. …”
Get full text
Article