Academic literature on the topic 'Blockchain and cryptography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Blockchain and cryptography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Blockchain and cryptography"

1

Kh-Madhloom, Jamal. "Dynamic Cryptography Integrated Secured Decentralized Applications with Blockchain Programming." Wasit Journal of Computer and Mathematics Science 1, no. 2 (2022): 21–33. http://dx.doi.org/10.31185/wjcm.vol1.iss2.41.

Full text
Abstract:
Blocks and chains are the building blocks of the blockchain, which is a community network. Blocks and chains are two terms used to describe collections of data information. The most fundamental need for a blockchain is that these postings be connected by cryptography, which is the case here. Cryptography. the entries in each block are added to as the list grows. Although the concept of blockchain cryptography is difficult, we have made it easier for you to understand. Asymmetric-key cryptography and hash functions are used in blockchains. Hash functions provide participants with a complete ima
APA, Harvard, Vancouver, ISO, and other styles
2

Ahmad, Nobaya. "Blockchain Technology and Cryptography." Journal of Research in Science and Engineering 7, no. 3 (2025): 22–24. https://doi.org/10.53469/jrse.2025.07(03).05.

Full text
Abstract:
Blockchain technology, coupled with cryptography, has emerged as a transformative force across various industries, promising enhanced security, transparency, and efficiency in digital transactions. This research paper explores the foundational principles of blockchain technology and cryptography, their interplay, and their applications across different sectors. We delve into the mechanisms that underpin blockchain's decentralized nature, consensus algorithms, cryptographic hash functions, digital signatures, and smart contracts. Furthermore, we examine the challenges and opportunities posed by
APA, Harvard, Vancouver, ISO, and other styles
3

Olajide Soji Osundare, Chidiebere Somadina Ike, Ololade Gilbert Fakeyede, and Adebimpe Bolatito Ige. "Blockchain and quantum cryptography: Future of secure telecommunications in banking." Engineering Science & Technology Journal 3, no. 2 (2022): 154–71. http://dx.doi.org/10.51594/estj.v3i2.1523.

Full text
Abstract:
The rapid evolution of telecommunications in the banking sector has necessitated advanced security measures to protect sensitive financial data and transactions. Blockchain technology, with its decentralized and immutable ledger system, has emerged as a promising solution for ensuring transparency, traceability, and security in banking communications. However, the potential threat posed by quantum computing to current cryptographic methods presents new challenges to the integrity of blockchain systems. Quantum cryptography, leveraging the principles of quantum mechanics, offers a robust altern
APA, Harvard, Vancouver, ISO, and other styles
4

Awasare, Om R. "Advanced Cryptographic Technologies in Blockchain." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem51038.

Full text
Abstract:
In the evolving landscape of digital technologies, blockchain has emerged as a cornerstone for building decentralized, transparent, and tamper-proof systems. Central to the security and reliability of blockchain is the use of advanced cryptographic techniques, which ensure data integrity, user privacy, and resistance to malicious attacks. This paper provides a comprehensive analysis of cutting-edge cryptographic technologies that are shaping the future of blockchain networks. Key mechanisms discussed include zero-knowledge proofs, homomorphic encryption, ring signatures, and post-quantum crypt
APA, Harvard, Vancouver, ISO, and other styles
5

Gaurav Malik and Prashasti. "Blockchain security- security challenges and solutions for decentralized systems and cryptocurrencies." International Journal of Science and Research Archive 9, no. 2 (2023): 1074–100. https://doi.org/10.30574/ijsra.2023.9.2.0515.

Full text
Abstract:
Blockchain technology is a chain of blocks formed using cryptography on multiple computers. It keeps a list of distributed transactions and ensures it is transparent, immutable, and hard to manipulate. Blockchain’s inherent security features would strengthen its build, including cryptographic hashing, consensus algorithms, and immutability. However, it is also highly exposed and vulnerable to several threats. In decentralized systems and cryptocurrencies, blockchain security is a crucial point of security to protect from attacks on systems, data breaches, and financial loss. Challenges in the
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, Hyunjun, Wonwoong Kim, Yeajun Kang, Hyunji Kim, and Hwajeong Seo. "Post-Quantum Delegated Proof of Luck for Blockchain Consensus Algorithm." Applied Sciences 14, no. 18 (2024): 8394. http://dx.doi.org/10.3390/app14188394.

Full text
Abstract:
The advancements in quantum computing and the potential for polynomial-time solutions to traditional public key cryptography (i.e., Rivest–Shamir–Adleman (RSA) and elliptic-curve cryptography (ECC)) using Shor’s algorithm pose a serious threat to the security of pre-quantum blockchain technologies. This paper proposes an efficient quantum-safe blockchain that incorporates new quantum-safe consensus algorithms. We integrate post-quantum signature schemes into the blockchain’s transaction signing and verification processes to enhance resistance against quantum attacks. Specifically, we employ th
APA, Harvard, Vancouver, ISO, and other styles
7

Harika B, Dr. "A Decentralized Approach to Academic Certificate Management Using Blockchain and IPFS." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47151.

Full text
Abstract:
Abstract- The increasing incidence of forged academic certificates has necessitated the development of secure, verifiable systems for credential management. This research proposes a decentralized approach to academic certificate issuance, storage, sharing, and verification utilizing blockchain technology and the InterPlanetary File System (IPFS). The system leverages blockchain's immutability to ensure trust and transparency, while IPFS provides decentralized and tamper-proof certificate storage. Advanced cryptographic techniques, including Elliptic Curve Cryptography (ECC) and AES encryption,
APA, Harvard, Vancouver, ISO, and other styles
8

Feltovic, Milan. "FROM THEORY TO PRACTICE: THE ROLE OF CRYPTOGRAPHY IN SECURING BLOCKCHAIN NETWORKS." MEST Journal 12, no. 2 (2024): 93–102. http://dx.doi.org/10.12709/mest.12.12.02.12.

Full text
Abstract:
Blockchain technology has evolved from its origins in cryptocurrencies to become a fundamental component of secure digital interactions across diverse sectors, including healthcare, finance, and public administration. This article delves into the theoretical and practical applications of cryptography within blockchain networks, emphasizing key cryptographic functions, algorithms, and protocols such as RSA, elliptic curve cryptography (ECC), and SHA-256. It scrutinizes the use of digital signatures for transaction verification and the crucial role of hash functions in ensuring data integrity. A
APA, Harvard, Vancouver, ISO, and other styles
9

Zi Jian, Woon, and Hazinah Kutty Mammi. "Cryptography for Blockchain System: Comparative Analysis of Cryptographic Algorithms." International Journal of Innovative Computing 15, no. 1 (2025): 131–37. https://doi.org/10.11113/ijic.v15n1.500.

Full text
Abstract:
This study aims to investigate the best cryptographic algorithm for Blockchain Networks. The rapid adoption of blockchain technology and cryptocurrencies has generated worries regarding their long-term security, specifically concerning the cryptographic algorithms used to protect these systems. Despite well-established cryptographic technologies, blockchain is not inherently secure and requires a comprehensive assessment to defend against cybersecurity threats and vulnerabilities. Therefore, this research has been conducted and aims to discover the best cryptographic algorithms for cryptocurre
APA, Harvard, Vancouver, ISO, and other styles
10

Jain, Itisha. "Blockchain Technology and Cryptography." International Journal of Science and Research (IJSR) 13, no. 5 (2024): 1715–17. http://dx.doi.org/10.21275/sr24524003904.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Blockchain and cryptography"

1

Duong, Tuyet. "BLOCKCHAIN SCALABILITY AND SECURITY." VCU Scholars Compass, 2018. https://scholarscompass.vcu.edu/etd/5559.

Full text
Abstract:
Cryptocurrencies like Bitcoin have proven to be a phenomenal success. The underlying techniques hold huge promise to change the future of financial transactions, and eventually the way people and companies compute, collaborate, and interact. At the same time, the current Bitcoin-like proof-of-work based blockchain systems are facing many challenges. In more detail, a huge amount of energy/electricity is needed for maintaining the Bitcoin blockchain. In addition, their security holds if the majority of the computing power is under the control of honest players. However, this assumption has been
APA, Harvard, Vancouver, ISO, and other styles
2

Palm, Emanuel. "Implications and Impact of Blockchain Transaction Pruning." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64986.

Full text
Abstract:
This thesis presents an extension to Hyperledger Fabric, a private blockchain system, allowing historic transactions to be pruned without peer coordination. The feature is facilitated via pruning predicate functions, provided along any smart contracts a given system is desired to host. An evaluation of the extension demonstrates its impact, in terms of memory saved, for a specific asset delivery use case. It is concluded that the gains of pruning historic transactions from blockchain systems could yield significantly reduced storage requirements for some categories of applications, especially
APA, Harvard, Vancouver, ISO, and other styles
3

Pérez, Kempner Octavio. "Malleable cryptography : advances and applications to privacy-enhancing technologies." Electronic Thesis or Diss., Université Paris sciences et lettres, 2022. http://www.theses.fr/2022UPSLE056.

Full text
Abstract:
Cette thèse étudie la malléabilité dans le contexte du chiffrement à clé publique et des signatures numériques, en présentant les avancées et les applications des technologies améliorant la confidentialité. La première partie aborde le problème de l'égalité générique des textes en clair et les preuves d'inégalité. Étant donné deux textes chiffrés générés par un schéma de chiffrement à clé publique, le problème de l'égalité des textes chiffrés consiste à déterminer si les textes chiffrés contiennent la même valeur. Parallèlement, le problème de l'inégalité du texte clair consiste à déterminer s
APA, Harvard, Vancouver, ISO, and other styles
4

Dalmasso, Loïc. "De la vulnérabilité des nœuds capteurs à la certification des transactions sur le réseau, une approche de la sécurisation de l’Internet des Objets." Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS069.

Full text
Abstract:
L’Internet des Objets (IdO) est une infrastructure mondiale, visant à connecter une multitude de systèmes de diverses natures, dans le but de générer de nouveaux services. Alors que cette hyperconnectivité laisse entrevoir de nombreuses perspectives dans tous les secteurs d’activité (e.g. la santé, l’industrie, l’énergie etc.), son déploiement constitue un défi majeur en termes de sécurité et de vie privée. L’usage de la cryptographie devient alors primordial, notamment pour assurer la confidentialité des données. Néanmoins, les algorithmes classiques tels que l’AES ne sont pas conçus pour êtr
APA, Harvard, Vancouver, ISO, and other styles
5

Alzahrani, Naif Saeed. "A Secure Anti-Counterfeiting System using Near Field Communication, Public Key Cryptography, Blockchain, and Bayesian Games." PDXScholar, 2019. https://pdxscholar.library.pdx.edu/open_access_etds/5038.

Full text
Abstract:
Counterfeit products, especially in the pharmaceutical sector, have plagued the international community for decades. To combat this problem, many anti-counterfeiting approaches have been proposed. They use either Radio Frequency Identification (RFID) or Near Field Communication (NFC) physical tags affixed to the products. Current anti-counterfeiting approaches detect two counterfeiting attacks: (1) modifications to a product's tag details, such as changing the expiration date; and (2) cloning of a genuine product's details to reuse on counterfeit products. In addition, these anti-counterfeitin
APA, Harvard, Vancouver, ISO, and other styles
6

OLIVEIRA, FILHO Márcio Barbosa de. "Utilizando o protocolo Bitcoin para condução de computações multilaterais seguras e justas." Universidade Federal de Pernambuco, 2016. https://repositorio.ufpe.br/handle/123456789/17143.

Full text
Abstract:
Submitted by Irene Nascimento (irene.kessia@ufpe.br) on 2016-06-22T17:04:20Z No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) Utilizando o Protocolo Bitcoin para Condução de Computações Multilaterais Seguras e Justas.pdf: 1665447 bytes, checksum: 2ff437be55e080c80d97e0d6582cb360 (MD5)<br>Made available in DSpace on 2016-06-22T17:04:20Z (GMT). No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) Utilizando o Protocolo Bitcoin para Condução de Computações Multilaterais Seguras e Justas.pdf: 1665447 bytes
APA, Harvard, Vancouver, ISO, and other styles
7

Pérez, Garcia Julio César. "Contribution to security and privacy in the Blockchain-based Internet of Things : Robustness, Reliability, and Scalability." Electronic Thesis or Diss., Avignon, 2023. http://www.theses.fr/2023AVIG0120.

Full text
Abstract:
L’Internet des Objets (IoT, Internet of Things) est un réseau diversifié d’objets interconnectés, généralement via l’internet. En raison de la sensibilité des informations échangées dans les applications de IoT, il est essentiel de garantir la sécurité et le respect de la vie privée. Ce problème est aggravé par la nature ouverte des communications sans fil et par les contraintes de puissance et de ressources computationnelles de la plupart des appareils IoT. Parallèlement, les solutions de sécurité IoT existantes sont basées sur des architectures centralisées, ce qui pose des problèmes d’évolu
APA, Harvard, Vancouver, ISO, and other styles
8

Piccolo, Alessandro. "Distributed ledger technology in the capital market : Shared versus private information in a permissioned blockchain." Thesis, Uppsala universitet, Avdelningen för datalogi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-326341.

Full text
Abstract:
This master thesis explores how blockchain technologies can be utilized within the financial sector with focus on how to store both private and public information on the blockchain. The capital market is looking into ways of cutting down administrative work through streamlining the financial process by using blockchain technologies. Public key encryption together with hash functions and a consensus mechanism make up the basis for creating a shared trustless database system. The thesis was conducted by extensive research concerning cryptographic topics, and a literature study was made to compar
APA, Harvard, Vancouver, ISO, and other styles
9

Carr, Christopher Alan. "Towards fairness and decentralisation in modern cryptocurrencies." Thesis, Queensland University of Technology, 2019. https://eprints.qut.edu.au/130876/1/Christopher%20Alan_Carr_Thesis.pdf.

Full text
Abstract:
The thesis examines and improves upon the properties of both fairness and decentralisation in modern cryptocurrencies, re-examining public key infrastructure, client puzzles and useful proofs of work in the blockchain context. The thesis also develops a framework construction for a novel directed-acyclic-graph-based cryptocurrency scheme. This framework represents a major result, being both the first academic and practically realisable proposal for using directed acyclic graphs in decentralised cryptocurrencies.
APA, Harvard, Vancouver, ISO, and other styles
10

Караван, В. Р., та Ю. В. Баришев. "Захист приватних повідомлень на основі технології блокчейн та псевдонедетермінованого шифрування". Thesis, ВНТУ, 2019. http://ir.lib.vntu.edu.ua//handle/123456789/24231.

Full text
Abstract:
Проаналізовано відомі систем обміну повідомленнями та спроектовано структуру власної системи захисту обміну повідомленнями на основі технології смарт-контрактів із застосуванням методу псевдонеде-термінованого шифрування. Смарт-контракт розгорнуто у блокчейні Ethereum.<br>The analysis of known messaging systems was performed and designed the structure of own secure messaging system based on smart-contract technology using the pseudonondeterministic ciphering method. Smart contract is deployed in the Ethereum blockchain.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Blockchain and cryptography"

1

Sharma, Ankita, Nayancy, and Rajat Verma. The Confluence of Cryptography, Blockchain and Artificial Intelligence. CRC Press, 2025. https://doi.org/10.1201/9781032711515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shankar, Raghava, and Srikanth RC Cherukupalli M.Tech. Blockchain Technology Basics: Blockchain cryptography and cybersecurity. Independently published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Murphy, Sean, and Rachel Player. Cryptography. 2nd ed. Oxford University PressOxford, 2025. https://doi.org/10.1093/actrade/9780192882233.001.0001.

Full text
Abstract:
Abstract We are far removed from the historical situation in which cryptography was used only by militaries and governments. With vast quantities of sensitive information transferred online by individuals, companies, organizations, and nation-states, cryptography is increasingly important to everyone. Most of us, often without realizing, use cryptography on a daily basis. Cryptography: A Very Short Introduction demystifies the art of cryptography by tracing its historical use, explaining how it works, and providing examples of its practical use. This second edition highlights the important adv
APA, Harvard, Vancouver, ISO, and other styles
4

Coinifide and Howard Poston. Blockchain Cryptography and Cybersecurity - Course #2: Cybersecurity. Coinifide LLC, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mohamed, Khaled Salah. New Frontiers in Cryptography: Quantum, Blockchain, Lightweight, Chaotic and DNA. Springer International Publishing AG, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mohamed, Khaled Salah. New Frontiers in Cryptography: Quantum, Blockchain, Lightweight, Chaotic and DNA. Springer International Publishing AG, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Raj, Pethuru, Chellammal Surianarayanan, and Kavita Saini. Blockchain Technology and Applications. Auerbach Publishers, Incorporated, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Blockchain Technology and Applications. Auerbach Publishers, Incorporated, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cryptography Algorithms: A Guide to Algorithms in Blockchain, Quantum Cryptography, Zero-Knowledge Protocols, and Homomorphic Encryption. de Gruyter GmbH, Walter, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum Cryptography. CRC Press LLC, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Blockchain and cryptography"

1

Bashir, Imran. "Cryptography." In Blockchain Consensus. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8179-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Buchanan, William J. "Blockchain and Crypto-currency." In Cryptography. River Publishers, 2022. http://dx.doi.org/10.1201/9781003337751-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Storublevtcev, Nikita. "Cryptography in Blockchain." In Computational Science and Its Applications – ICCSA 2019. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24296-1_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Long, Ying, Yinyan Gong, Weihong Huang, Jiahong Cai, Nengxiang Xu, and Kuan-ching Li. "Cryptography of Blockchain." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-28124-2_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chatterjee, Runa. "Lightweight Cryptography and Protocols for IoT Security." In Blockchain. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003203957-18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bermejo Higuera, Javier, Juan Ramón Bermejo Higuer, Juan Antonio Sicilia Montalvo, and Rubén González Crespo. "Introduction to Cryptography in Blockchain." In Blockchain Technologies. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-3412-3_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rawal, Bharat, and Alexander Peter. "Quantum-Safe Cryptography and Security." In Blockchain Technologies. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-3412-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

van Flymen, Daniel. "Cryptography 101." In Learn Blockchain by Building One. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5171-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hellwig, Daniel, Goran Karlic, and Arnd Huchzermeier. "Blockchain Cryptography: Part 1." In Build Your Own Blockchain. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-40142-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hellwig, Daniel, Goran Karlic, and Arnd Huchzermeier. "Blockchain Cryptography: Part 2." In Build Your Own Blockchain. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-40142-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Blockchain and cryptography"

1

Singh, Divyanshu, Atharv Mishra, Brindha R, P. Renukadevi, Ajanthaa Lakkshmanan, and R. Brindha. "Crowdfunding using Blockchain and Cryptography." In 2025 Third International Conference on Augmented Intelligence and Sustainable Systems (ICAISS). IEEE, 2025. https://doi.org/10.1109/icaiss61471.2025.11041985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Misiakoulis, George, Harris Niavis, Stephane Kundig, and Konstantinos Loupos. "Enhancing Security and Scalability in Electronic Voting Through Privacy-Preserving Cryptography and Efficient Data Structures." In 2024 IEEE International Conference on Blockchain (Blockchain). IEEE, 2024. http://dx.doi.org/10.1109/blockchain62396.2024.00093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Xu, Ziqiang, S. Ahmad Salehi, and Naveen Chilamkurti. "Cryptography-Based Bootstrapping Scheme for Permissionless Sharding Blockchain." In 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S). IEEE, 2024. http://dx.doi.org/10.1109/dsn-s60304.2024.00043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Alcaraz, Cristina, Davide Ferraris, Hector Guzman, and Javier Lopez. "Blockchain-Based Multi-Signature System for Critical Scenarios." In 22nd International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013559000003979.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Anagnostopoulou, Argiro, Eleni Kehrioti, Ioannis Mavridis, and Dimitris Gritzalis. "Bolstering IIoT Resilience: The Synergy of Blockchain and CapBAC." In 22nd International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013513800003979.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

El Bizri, Mustafa, Hiba Bazzi, Ali H. Nassar, and Ali M. Haidar. "Enhancing Healthcare Data Security with Blockchain and Advanced Cryptography." In 2025 International Conference on New Trends in Computing Sciences (ICTCS). IEEE, 2025. https://doi.org/10.1109/ictcs65341.2025.10989413.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rai, Keerti, Abhinav, and Richa Tiwari. "Optimizing the Efficiency of Applied Cryptography Algorithms for Blockchain Networks." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724629.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bhatt, Stuti, and Sachin Sharma. "Quantum Cryptography Using Blockchain for 6G Enabled Internet of Vehicles." In 2024 1st International Conference on Advanced Computing and Emerging Technologies (ACET). IEEE, 2024. http://dx.doi.org/10.1109/acet61898.2024.10730580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hsu, Chien-Lung, Yi-Cheih Hsu, Yu-Jen Shih, Cheng-Wei Wu, and Fu-Hau Hsu. "A Vehicle Forensics framework with Post-Quantum Cryptography and Blockchain." In 2024 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS). IEEE, 2024. https://doi.org/10.1109/ispacs62486.2024.10868749.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Al Maqousi, Ali, and Kashinath Basu. "Cybersecurity Framework for Smart Cities: Leveraging Quantum Cryptography and Blockchain." In 2025 1st International Conference on Computational Intelligence Approaches and Applications (ICCIAA). IEEE, 2025. https://doi.org/10.1109/icciaa65327.2025.11013570.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Blockchain and cryptography"

1

Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.

Full text
Abstract:
Abstract: As quantum computing and quantum communication technologies advance, securing quantum networks against emerging cyber threats has become a critical challenge. Traditional cryptographic methods are vulnerable to quantum attacks, necessitating the development of AI-driven security solutions. This research explores the integration of machine learning (ML) algorithms with quantum cryptographic frameworks to enhance Quantum Key Distribution (QKD), post-quantum cryptography (PQC), and real-time threat detection. AI-powered quantum security mechanisms, including neural network-based quantum
APA, Harvard, Vancouver, ISO, and other styles
2

Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.

Full text
Abstract:
Abstract: The rapid adoption of artificial intelligence (AI) in cloud and edge computing environments has transformed industries by enabling large-scale automation, real-time analytics, and intelligent decision-making. However, the increasing reliance on AI-powered infrastructures introduces significant cybersecurity challenges, including adversarial attacks, data privacy risks, and vulnerabilities in AI model supply chains. This research explores advanced cybersecurity frameworks tailored to protect AI-driven cloud and edge computing environments. It investigates AI-specific security threats,
APA, Harvard, Vancouver, ISO, and other styles
3

Beoku-Betts, Iman, and Tom Kaye. EdTech Horizon Scan: Blockchain technology in education. EdTech Hub, 2022. http://dx.doi.org/10.53832/edtechhub.0101.

Full text
Abstract:
EdTech Hub horizon scans are publications designed to provoke thinking on a range of topics related to the design, implementation, oversight, and monitoring and evaluation of educational technology (EdTech) tools, products, services, and related ideas. This EdTech Horizon Scan examines the use of blockchain technology in education. Beginning with an overview of blockchain technology, the scan explains what blockchain technology is and how it works. The next section focusses on how blockchain technology can be used in education. In particular, it looks at the benefits of using blockchain techno
APA, Harvard, Vancouver, ISO, and other styles
4

Pasupuleti, Murali Krishna. Automated Smart Contracts: AI-powered Blockchain Technologies for Secure and Intelligent Decentralized Governance. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv425.

Full text
Abstract:
Abstract: Automated smart contracts represent a paradigm shift in decentralized governance by integrating artificial intelligence (AI) with blockchain technologies to enhance security, scalability, and adaptability. Traditional smart contracts, while enabling trustless and automated transactions, often lack the flexibility to adapt to dynamic regulatory frameworks, evolving economic conditions, and real-time security threats. AI-powered smart contracts leverage machine learning, reinforcement learning, and predictive analytics to optimize contract execution, detect fraudulent transactions, and
APA, Harvard, Vancouver, ISO, and other styles
5

Alzahrani, Naif. A Secure Anti-Counterfeiting System using Near Field Communication, Public Key Cryptography, Blockchain, and Bayesian Games. Portland State University Library, 2000. http://dx.doi.org/10.15760/etd.6914.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pasupuleti, Murali Krishna. Next-Generation Extended Reality (XR): A Unified Framework for Integrating AR, VR, and AI-driven Immersive Technologies. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv325.

Full text
Abstract:
Abstract: Extended Reality (XR), encompassing Augmented Reality (AR), Virtual Reality (VR), and Mixed Reality (MR), is evolving into a transformative technology with applications in healthcare, education, industrial training, smart cities, and entertainment. This research presents a unified framework integrating AI-driven XR technologies with computer vision, deep learning, cloud computing, and 5G connectivity to enhance immersion, interactivity, and scalability. AI-powered neural rendering, real-time physics simulation, spatial computing, and gesture recognition enable more realistic and adap
APA, Harvard, Vancouver, ISO, and other styles
7

Allende López, Marcos, Diego López, Sergio Cerón, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003313.

Full text
Abstract:
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH
APA, Harvard, Vancouver, ISO, and other styles
8

Al-Suwailem, Sami. The Case for Crypto Sukuk. Islamic Development Bank Institute, 2021. http://dx.doi.org/10.55780/re24016.

Full text
Abstract:
Cryptocurrencies are causing measurable disruptions in the finance world. The speculative nature of many of these currencies casts doubts on their economic value and their role in improving the prosperity of the lives of human beings. But the underlying technology, the blockchain technology and the cryptographic techniques, are obviously of immense potential. The question, however, is how to apply these technologies productively. One such application is in the area of Islamic capital markets instruments, particularly Sukuk.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!