To see the other types of publications on this topic, follow the link: Blockchain and cryptography.

Journal articles on the topic 'Blockchain and cryptography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Blockchain and cryptography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kh-Madhloom, Jamal. "Dynamic Cryptography Integrated Secured Decentralized Applications with Blockchain Programming." Wasit Journal of Computer and Mathematics Science 1, no. 2 (2022): 21–33. http://dx.doi.org/10.31185/wjcm.vol1.iss2.41.

Full text
Abstract:
Blocks and chains are the building blocks of the blockchain, which is a community network. Blocks and chains are two terms used to describe collections of data information. The most fundamental need for a blockchain is that these postings be connected by cryptography, which is the case here. Cryptography. the entries in each block are added to as the list grows. Although the concept of blockchain cryptography is difficult, we have made it easier for you to understand. Asymmetric-key cryptography and hash functions are used in blockchains. Hash functions provide participants with a complete ima
APA, Harvard, Vancouver, ISO, and other styles
2

Ahmad, Nobaya. "Blockchain Technology and Cryptography." Journal of Research in Science and Engineering 7, no. 3 (2025): 22–24. https://doi.org/10.53469/jrse.2025.07(03).05.

Full text
Abstract:
Blockchain technology, coupled with cryptography, has emerged as a transformative force across various industries, promising enhanced security, transparency, and efficiency in digital transactions. This research paper explores the foundational principles of blockchain technology and cryptography, their interplay, and their applications across different sectors. We delve into the mechanisms that underpin blockchain's decentralized nature, consensus algorithms, cryptographic hash functions, digital signatures, and smart contracts. Furthermore, we examine the challenges and opportunities posed by
APA, Harvard, Vancouver, ISO, and other styles
3

Olajide Soji Osundare, Chidiebere Somadina Ike, Ololade Gilbert Fakeyede, and Adebimpe Bolatito Ige. "Blockchain and quantum cryptography: Future of secure telecommunications in banking." Engineering Science & Technology Journal 3, no. 2 (2022): 154–71. http://dx.doi.org/10.51594/estj.v3i2.1523.

Full text
Abstract:
The rapid evolution of telecommunications in the banking sector has necessitated advanced security measures to protect sensitive financial data and transactions. Blockchain technology, with its decentralized and immutable ledger system, has emerged as a promising solution for ensuring transparency, traceability, and security in banking communications. However, the potential threat posed by quantum computing to current cryptographic methods presents new challenges to the integrity of blockchain systems. Quantum cryptography, leveraging the principles of quantum mechanics, offers a robust altern
APA, Harvard, Vancouver, ISO, and other styles
4

Awasare, Om R. "Advanced Cryptographic Technologies in Blockchain." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem51038.

Full text
Abstract:
In the evolving landscape of digital technologies, blockchain has emerged as a cornerstone for building decentralized, transparent, and tamper-proof systems. Central to the security and reliability of blockchain is the use of advanced cryptographic techniques, which ensure data integrity, user privacy, and resistance to malicious attacks. This paper provides a comprehensive analysis of cutting-edge cryptographic technologies that are shaping the future of blockchain networks. Key mechanisms discussed include zero-knowledge proofs, homomorphic encryption, ring signatures, and post-quantum crypt
APA, Harvard, Vancouver, ISO, and other styles
5

Gaurav Malik and Prashasti. "Blockchain security- security challenges and solutions for decentralized systems and cryptocurrencies." International Journal of Science and Research Archive 9, no. 2 (2023): 1074–100. https://doi.org/10.30574/ijsra.2023.9.2.0515.

Full text
Abstract:
Blockchain technology is a chain of blocks formed using cryptography on multiple computers. It keeps a list of distributed transactions and ensures it is transparent, immutable, and hard to manipulate. Blockchain’s inherent security features would strengthen its build, including cryptographic hashing, consensus algorithms, and immutability. However, it is also highly exposed and vulnerable to several threats. In decentralized systems and cryptocurrencies, blockchain security is a crucial point of security to protect from attacks on systems, data breaches, and financial loss. Challenges in the
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, Hyunjun, Wonwoong Kim, Yeajun Kang, Hyunji Kim, and Hwajeong Seo. "Post-Quantum Delegated Proof of Luck for Blockchain Consensus Algorithm." Applied Sciences 14, no. 18 (2024): 8394. http://dx.doi.org/10.3390/app14188394.

Full text
Abstract:
The advancements in quantum computing and the potential for polynomial-time solutions to traditional public key cryptography (i.e., Rivest–Shamir–Adleman (RSA) and elliptic-curve cryptography (ECC)) using Shor’s algorithm pose a serious threat to the security of pre-quantum blockchain technologies. This paper proposes an efficient quantum-safe blockchain that incorporates new quantum-safe consensus algorithms. We integrate post-quantum signature schemes into the blockchain’s transaction signing and verification processes to enhance resistance against quantum attacks. Specifically, we employ th
APA, Harvard, Vancouver, ISO, and other styles
7

Harika B, Dr. "A Decentralized Approach to Academic Certificate Management Using Blockchain and IPFS." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47151.

Full text
Abstract:
Abstract- The increasing incidence of forged academic certificates has necessitated the development of secure, verifiable systems for credential management. This research proposes a decentralized approach to academic certificate issuance, storage, sharing, and verification utilizing blockchain technology and the InterPlanetary File System (IPFS). The system leverages blockchain's immutability to ensure trust and transparency, while IPFS provides decentralized and tamper-proof certificate storage. Advanced cryptographic techniques, including Elliptic Curve Cryptography (ECC) and AES encryption,
APA, Harvard, Vancouver, ISO, and other styles
8

Feltovic, Milan. "FROM THEORY TO PRACTICE: THE ROLE OF CRYPTOGRAPHY IN SECURING BLOCKCHAIN NETWORKS." MEST Journal 12, no. 2 (2024): 93–102. http://dx.doi.org/10.12709/mest.12.12.02.12.

Full text
Abstract:
Blockchain technology has evolved from its origins in cryptocurrencies to become a fundamental component of secure digital interactions across diverse sectors, including healthcare, finance, and public administration. This article delves into the theoretical and practical applications of cryptography within blockchain networks, emphasizing key cryptographic functions, algorithms, and protocols such as RSA, elliptic curve cryptography (ECC), and SHA-256. It scrutinizes the use of digital signatures for transaction verification and the crucial role of hash functions in ensuring data integrity. A
APA, Harvard, Vancouver, ISO, and other styles
9

Zi Jian, Woon, and Hazinah Kutty Mammi. "Cryptography for Blockchain System: Comparative Analysis of Cryptographic Algorithms." International Journal of Innovative Computing 15, no. 1 (2025): 131–37. https://doi.org/10.11113/ijic.v15n1.500.

Full text
Abstract:
This study aims to investigate the best cryptographic algorithm for Blockchain Networks. The rapid adoption of blockchain technology and cryptocurrencies has generated worries regarding their long-term security, specifically concerning the cryptographic algorithms used to protect these systems. Despite well-established cryptographic technologies, blockchain is not inherently secure and requires a comprehensive assessment to defend against cybersecurity threats and vulnerabilities. Therefore, this research has been conducted and aims to discover the best cryptographic algorithms for cryptocurre
APA, Harvard, Vancouver, ISO, and other styles
10

Jain, Itisha. "Blockchain Technology and Cryptography." International Journal of Science and Research (IJSR) 13, no. 5 (2024): 1715–17. http://dx.doi.org/10.21275/sr24524003904.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Khalid, Zhwan Mohammed, and Shavan Askar. "Resistant Blockchain Cryptography to Quantum Computing Attacks." International Journal of Science and Business 5, no. 3 (2021): 116–25. https://doi.org/10.5281/zenodo.4497732.

Full text
Abstract:
Due to the need to maintain confidentiality, redundancy, and openness, the usage of Blockchain and other DLTs has dramatically advanced in recent years, and is being recommended for various applications. In blockchain, these capabilities are supplied by means of hash functions and public-key encryption. However, the rapid development of quantum computation in the near future has opened the door to the Grover and Shor algorithms. These algorithms challenge both public and hash encryption, causing blockchains to redesign and use quantum attack-tolerant cryptosystems; this produces cryptosystems
APA, Harvard, Vancouver, ISO, and other styles
12

Adeyemi Afolayan Adesola, Awele Mary-rose Ilusanmi, and Peter Chimee. "A review of the cryptographic approaches to data security: The impact of quantum computing, evolving challenges and future solutions." World Journal of Advanced Research and Reviews 25, no. 2 (2025): 1916–24. https://doi.org/10.30574/wjarr.2025.25.2.0434.

Full text
Abstract:
Cryptography plays a fundamental role in defending digital data against cyberthreats and emerging quantum computer capabilities. This review discusses core cryptographic techniques such as symmetric encryption, asymmetric encryption and cryptographic hashing, as well as advanced techniques like lattice-based cryptography , code-based cryptography, multi-variate polynomial cryptography and hash-based cryptography that are quantum resistant. The review share insight into the applications of cryptographic techniques in securing communications, encrypting databases, blockchain technology, and heal
APA, Harvard, Vancouver, ISO, and other styles
13

Kamble, Pratiksha Madhukar, Rushikesh Prakash Ichake, Pratiksha Vishnu Jawale, Sunil Krishna Dokfode, and Poonam Tiware. "Blockcrypt cryptography based communication." International Journal of Science and Social Science Research 2, no. 1 (2024): 117–21. https://doi.org/10.5281/zenodo.13340593.

Full text
Abstract:
Blockchain is a new technology that overcomes threats and allows decentralization of sensitive tasks while maintaininghigh performance. security. It eliminates the need for trusted intermediaries. Blockchain is a new technology that provides adecentralized platform that ensures data integrity, transparency, traceability, anonymity, non-repudiation, accountability and nontampering. Blockchain accesses all network nodes and tracks all transactions taking place. The aim of our work is to propose securecommunication based on blockchain technology. In this project, we explain why blockchain will ma
APA, Harvard, Vancouver, ISO, and other styles
14

Imran Ahmed Shaik. "Security applications of blockchain: Emerging research and innovations." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 1183–90. https://doi.org/10.30574/wjarr.2025.26.2.1664.

Full text
Abstract:
This article examines the evolving landscape of blockchain technology as a security framework across diverse domains. Blockchain's fundamental architecture—based on decentralization, immutability, transparency, and cryptographic security—offers distinctive advantages in addressing contemporary cybersecurity challenges. The article explores established implementations and cutting-edge innovations in blockchain security, including decentralized identity management, supply chain integrity verification, quantum-resistant cryptography, cross-chain interoperability protocols, and integration with ar
APA, Harvard, Vancouver, ISO, and other styles
15

Cambou, Bertrand, Michael Gowanlock, Julie Heynssens, et al. "Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions." Cryptography 4, no. 2 (2020): 17. http://dx.doi.org/10.3390/cryptography4020017.

Full text
Abstract:
Blockchain technology is a game-changing, enhancing security for the supply chain of smart additive manufacturing. Blockchain enables the tracking and recording of the history of each transaction in a ledger stored in the cloud that cannot be altered, and when blockchain is combined with digital signatures, it verifies the identity of the participants with its non-repudiation capabilities. One of the weaknesses of blockchain is the difficulty of preventing malicious participants from gaining access to public–private key pairs. Groups of opponents often interact freely with the network, and thi
APA, Harvard, Vancouver, ISO, and other styles
16

Patel, Krisha. "Cryptography And Network Security." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem46815.

Full text
Abstract:
Abstract -Cryptography and network security are foundational domains in the field of information technology and cybersecurity. As digital communication continues to expand, protecting data from unauthorized access, tampering, and interception is paramount. This paper presents a detailed review of the core principles, algorithms, protocols, emerging technologies, and challenges in cryptography and network security. We explore classical and modern cryptographic techniques, the structure and defense mechanisms of network security, current advancements such as quantum cryptography and blockchain i
APA, Harvard, Vancouver, ISO, and other styles
17

Kumar,, Varun. "Challenges and Future Trends of Cryptography in Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30505.

Full text
Abstract:
The incorporation of cryptographic techniques is crucial for guaranteeing data privacy and security processed additionally sent inside IOT ecosystems, particularly as the IOT keeps growing. Examining problems including resource limitations, scalability, and the dynamic nature of IOT environments, this research paper explores the complex obstacles that cryptographic solutions confront considering the IOT. Lightweight cryptography, post-quantum cryptography, and blockchain integration are some of the new trends and future prospects in cryptographic research that are examined in this study in an
APA, Harvard, Vancouver, ISO, and other styles
18

Adeoye, Seun. "Securing IoT Devices: A Novel Approach Using Blockchain and Quantum Cryptography." Cognizance Journal of Multidisciplinary Studies 5, no. 2 (2025): 302–26. https://doi.org/10.47760/cognizance.2025.v05i02.022.

Full text
Abstract:
Rapid growth in IoT devices creates major security difficulties because they present potential weakening of systems to cyberattacks and open data breaches in addition to unauthorized system access. Traditional security methods relying on centralized authentication together with classical cryptographic techniques prove inadequate because they have single points of failure and exist under the threat of quantum computing advancement. A new system integrates blockchain technology and quantum cryptography according to this paper to resolve security issues. Data security through blockchain systems g
APA, Harvard, Vancouver, ISO, and other styles
19

Seun, Adeoye. "Securing IoT Devices: A Novel Approach Using Blockchain and Quantum Cryptography." Cognizance Journal of Multidisciplinary Studies (CJMS) 5, no. 2 (2025): 302–26. https://doi.org/10.47760/cognizance.2025.v05i02.022.

Full text
Abstract:
Rapid growth in IoT devices creates major security difficulties because they present potential weakening of systems to cyberattacks and open data breaches in addition to unauthorized system access. Traditional security methods relying on centralized authentication together with classical cryptographic techniques prove inadequate because they have single points of failure and exist under the threat of quantum computing advancement. A new system integrates blockchain technology and quantum cryptography according to this paper to resolve security issues. Data security through blockchain systems g
APA, Harvard, Vancouver, ISO, and other styles
20

Gbadebo, Michael Olayinka. "Integrating Post-Quantum Cryptography and Advanced Encryption Standards to Safeguard Sensitive Financial Records from Emerging Cyber Threats." Asian Journal of Research in Computer Science 18, no. 4 (2025): 1–23. https://doi.org/10.9734/ajrcos/2025/v18i4605.

Full text
Abstract:
This study examines the integration of Post-Quantum Cryptography (PQC) and Advanced Encryption Standard (AES) to safeguard financial records against quantum-enabled cyber threats. A quantitative approach was employed using data from the NIST Post-Quantum Cryptography Project Dataset, Google Homomorphic Encryption Benchmark Dataset, Hyperledger Fabric Blockchain Performance Dataset, and World Bank Financial Stability Indicators Dataset. Multi-Criteria Decision Analysis (MCDA) with the Analytic Hierarchy Process (AHP) assessed cryptographic agility, while Multiple Linear Regression (MLR) analyze
APA, Harvard, Vancouver, ISO, and other styles
21

Dmytro, Poltavskyi. "Cryptographic techniques in blockchain for enhanced digital asset security." American Journal of Engineering and Technology 07, no. 05 (2025): 76–87. https://doi.org/10.37547/tajet/volume07issue05-06.

Full text
Abstract:
This article examines the role cryptographic methods play in protecting digital assets through blockchain systems, with a particular focus on their adjustment to contemporary challenges and technological trends. An endeavor is undertaken to systematize major cryptographic algorithms, their effective appraisal in data protection, and development prospects under quantum computing threats. The study is relevant because centralized systems increasingly depend on cryptography due to greater regulatory pressures and, above all, a need for security through secrecy. The scientific novelty lies in the
APA, Harvard, Vancouver, ISO, and other styles
22

Priyanka Agarwal, Kanchan Kumari, Pratham Sharma. "A Review on Blockchain and its Future Scope." Tuijin Jishu/Journal of Propulsion Technology 44, no. 1 (2023): 171–74. http://dx.doi.org/10.52783/tjjpt.v44.i1.2235.

Full text
Abstract:
Blockchain is a technology with desirable properties such as decentralization, autonomy, integrity, immutability, verification, fault tolerance, anonymity, control and transparency. In this article, we begin to explore blockchain technology, specifically its history, quantitative comparison of consensus algorithms, cryptographic details from a general cryptography perspective, hash functions used in blockchain, and more. Complete list of blocking programs. Additionally, this paper focuses on blockchain security. Specifically, we evaluate blockchain security from risk analysis to lower blockcha
APA, Harvard, Vancouver, ISO, and other styles
23

Gkikaki, Mairi, Clare Rowan, and Isaac Quinn DuPont. "DAO, Blockchain and Cryptography." Exchanges: The Interdisciplinary Research Journal 7, no. 3 (2020): 103–17. http://dx.doi.org/10.31273/eirj.v7i3.594.

Full text
Abstract:
In Classical Athens, as well as in our modern digital era, governance has been achieved through tokens. Tokens enabled voting on projects, representation, and belonging. The Distributed Autonomous Organisation (DAO) launched on the basis of cryptocurrency and blockchain technology was conceived as a form of algorithmic governance with applications in the organisation of companies. The visionaries of the DAO envisaged, among other things, a new form of sociality, which would be transparent and fair and based on a decentralised, unstoppable, public blockchain. These hopes were dashed when the DA
APA, Harvard, Vancouver, ISO, and other styles
24

Cachin, Christian. "Blockchain, Cryptography, and Consensus." Electronic Proceedings in Theoretical Computer Science 261 (November 29, 2017): 1. http://dx.doi.org/10.4204/eptcs.261.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Khan, Safiullah, Wai-Kong Lee, Abdul Majeed, and Seong Oun Hwang. "Blockchain meets lightweight cryptography." IEEE Potentials 41, no. 6 (2022): 38–42. http://dx.doi.org/10.1109/mpot.2022.3204849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Kishor Madhukar Dhole, Et al. "Quantum Blockchain: Unraveling the Potential of Quantum Cryptography for Distributed Ledgers." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11s (2023): 700–707. http://dx.doi.org/10.17762/ijritcc.v11i11s.9661.

Full text
Abstract:
The examination investigates the joining of quantum-safe cryptographic calculations into blockchain innovation, zeroing in on grid-based cryptography and hash-based marks. Because of the inescapable danger presented by quantum processing, this study proposes a quantum-safe blockchain system intended to upgrade the security and flexibility of circulated records. The cross-section-based cryptography calculation uses the computational intricacy of grid issues, offering protection from quantum goes like Shor's calculation. Simultaneously, hash-based marks give lightweight and quantum-safe choices
APA, Harvard, Vancouver, ISO, and other styles
27

Lakshmi, J. Guru. "Blockchain and Cryptography Communication System." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 2527–32. http://dx.doi.org/10.22214/ijraset.2023.50702.

Full text
Abstract:
Abstract: Blockchain is an innovative technology that overcomes these threats, allowing sensitive operations to be decentralized while maintaining a high level of security. Eliminate the need for trusted intermediaries. The blockchain is accessible to network nodes and keeps track of all transactions that have taken place. The goal of our work is to offer a secure communication solution based on blockchain technology. In this project, we explain why blockchain should secure communications and offer a blockchain-based messaging design pattern that maintains the performance and security of data
APA, Harvard, Vancouver, ISO, and other styles
28

Mohamed, Debbab, ALI PACHA. A.B, and BOUKLI HACENE.S. "Hybridization of Blockchain and Cryptography to Secure a Transaction Using Smart Contacts." International Journal of Advances in Soft Computing and its Applications 17, no. 1 (2025): 16–31. https://doi.org/10.15849/ijasca.250330.02.

Full text
Abstract:
Although often equated to a large database owing to the nature of its use, Blockchain technology is fully distinct due to its fully uncontrolled structure. These traits make it beneficial for changing how finances are exchanged as it is safe and trustable. Moreover, integrating modern cryptography such as AES-256 for encryption and ECDSA for signatures into a blockchain system can elevate its level of security to greater heights. This research examines the prospect of developing a hybrid model which incorporates the use of blockchain in accordance with cryptography to reinforce security for fi
APA, Harvard, Vancouver, ISO, and other styles
29

Nizamuddin, Md, Krishna Devarapu, Abhishake Reddy Onteddu, and RamMohan Reddy Kundavaram. "Cryptography Converges with AI in Financial Systems: Safeguarding Blockchain Transactions with AI." Asian Business Review 12, no. 3 (2022): 97–106. https://doi.org/10.18034/abr.v12i3.742.

Full text
Abstract:
This paper examines how encryption and AI protect financial blockchain transactions. As blockchain technology grows more important in decentralized finance, AI must be included to solve cybersecurity issues. The research focuses on how AI improves cryptography systems, blockchain-based financial operations, and transaction security. Secondary data from the literature, peer-reviewed publications, and case studies are analyzed to synthesize AI-blockchain cryptography expertise. AI provides real-time anomaly identification, fraud prevention, predictive analytics, consensus mechanism optimization,
APA, Harvard, Vancouver, ISO, and other styles
30

Ra, Gyeongjin, Deahee Seo, Md Zakirul Alam Bhuiyan, and Imyeong Lee. "An Anonymous Protocol with User Identification and Linking Capabilities for User Privacy in a Permissioned Blockchain." Electronics 9, no. 8 (2020): 1183. http://dx.doi.org/10.3390/electronics9081183.

Full text
Abstract:
A permissioned blockchain includes a user in the network after verifying the user’s identity, in contrast to Bitcoin, which is a public blockchain that allows network participation without third-party approval. The two types of permissioned blockchains are private blockchains, each consisting of one server and multiple users, and consortium blockchains, which consist of groups of private blockchains. However, a blockchain has privacy issues, such as user tracking and inference. Therefore, cryptography should be applied for user privacy in a blockchain. There is a lot of research on anonymous p
APA, Harvard, Vancouver, ISO, and other styles
31

Wen, Xiao-Jun, Yong-Zhi Chen, Xin-Can Fan, Zheng-Zhong Yi, Zoe L. Jiang, and Jun-Bin Fang. "Quantum blockchain system." Modern Physics Letters B 35, no. 20 (2021): 2150343. http://dx.doi.org/10.1142/s0217984921503437.

Full text
Abstract:
Blockchain technology represented by Bitcoin and Ethereum has been deeply developed and widely used due to its broad application prospects such as digital currency and IoT. However, the security of the existing blockchain technologies built on the classical cryptography depends on the computational complexity problem. With the enhancement of the attackers’ computing power, especially the upcoming quantum computers, this kind of security is seriously threatened. Based on quantum hash, quantum SWAP test and quantum teleportation, a quantum blockchain system is proposed with quantum secure commun
APA, Harvard, Vancouver, ISO, and other styles
32

Yang, Yang, Shangbin Han, Ping Xie, et al. "Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3." Sensors 22, no. 16 (2022): 5951. http://dx.doi.org/10.3390/s22165951.

Full text
Abstract:
With the increasing demand for privacy protection in the blockchain, the universal zero-knowledge proof protocol has been developed and widely used. Because hash function is an important cryptographic primitive in a blockchain, the zero-knowledge proof of hash preimage has a wide range of application scenarios. However, it is hard to implement it due to the transformation of efficiency and execution complexity. Currently, there are only zero-knowledge proof circuits of some widely used hash functions that have been implemented, such as SHA256. SM3 is a Chinese hash function standard published
APA, Harvard, Vancouver, ISO, and other styles
33

Guru, Abhishek, Bhabendu Kumar Mohanta, Hitesh Mohapatra, Fadi Al-Turjman, Chadi Altrjman, and Arvind Yadav. "A Survey on Consensus Protocols and Attacks on Blockchain Technology." Applied Sciences 13, no. 4 (2023): 2604. http://dx.doi.org/10.3390/app13042604.

Full text
Abstract:
In the current era, blockchain has approximately 30 consensus algorithms. This architecturally distributed database stores data in an encrypted form with multiple checks, including elliptical curve cryptography (ECC) and Merkle hash tree. Additionally, many researchers aim to implement a public key infrastructure (PKI) cryptography mechanism to boost the security of blockchain-based data management. However, the issue is that many of these are required for advanced cryptographic protocols. For all consensus protocols, security features are required to be discussed because these consensus algor
APA, Harvard, Vancouver, ISO, and other styles
34

Syed, Zubair Yuneeb Shakeeb Ahmed Tejas B. N. Sneha Singh Dr.C Nandini and Dr. Jahnavi Shankar. "Advanced Secured Key Generation Using User Face and Hand Geometry." INTERNATIONAL JOURNAL OF EMERGING TRENDS IN ENGINEERING AND DEVELOPMENT (IJETED) 15, no. 1 (2025): 52–61. https://doi.org/10.5281/zenodo.15280636.

Full text
Abstract:
<strong>ABSTRACT </strong> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The rapid growth of connected systems has brought significant security concerns, mainly in the field of data protection and user authentication. To address these challenges, this paper presents an innovative security solution combining <strong>Quantum Visual Cryptography</strong> with <strong>Multimodal Biometric Encryption</strong> and <strong>Blockchain Technology</strong>. The system utilizes the advanced cryptographic capabilities of quantum mechanics to enhance data transmission security [1], [6], while incorporating multimod
APA, Harvard, Vancouver, ISO, and other styles
35

Mallikarjuna, Basetty, Gagandeep Berar, Ajit Noonia, Lekha Rani, Chittemsetty Pushpalatha, and Shiju Sebastian. "A novel approach for integrating cryptography and blockchain into IoT system." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 7 (2024): 2087–99. http://dx.doi.org/10.47974/jdmsc-2082.

Full text
Abstract:
The quick advancement of Internet of Things (IoT) emphasizes the significance of cryptography and blockchain ensuring the security of sensitive data and connected devices. Blockchain technology and encryption play key roles in ensuring the security of the expansive IoT network. Blockchain offers decentralized trust, immutability, and transparency to IoT networks and transactions, while encryption serves to protect IoT data from unauthorized access. It is a novel approach for integrating cryptography and blockchain into IoT System, cryptography and blockchain stand out as robust technologies th
APA, Harvard, Vancouver, ISO, and other styles
36

Phiang, Jun Kong, Vivian Yong Siew Yee, Hafizuddin Bin Hilmi, Dedree Leonna Lai, Ng Ee Zoe, and Muhammad Faisal. "Enhancing Security in Industrial IoT Through Blockchain-based Authentication Mechanisms." International Journal of Electrical Engineering, Mathematics and Computer Science 1, no. 3 (2024): 43–61. http://dx.doi.org/10.62951/ijeemcs.v1i3.20.

Full text
Abstract:
The Industrial Internet of Things (IIoT) has revolutionized industrial processes, offering automation and data-driven decision-making. However, this interconnectedness brings new security challenges, especially in crucial infrastructure sectors. Traditional security measures are inadequate, leading to the exploration of innovative solutions. Blockchain technology has emerged as a promising solution due to its decentralized and immutable nature. This paper proposes a Hybrid Blockchain-Based Authentication Mechanism for IIoT, combining Delegated Proof of Stake (DPoS) and Elliptic Curve Cryptogra
APA, Harvard, Vancouver, ISO, and other styles
37

Abdelrahman, Mohamed. "Blockchain Cryptography and Security Issues." International Journal of Computer Science & Engineering Survey 13, no. 5/6 (2022): 01–07. http://dx.doi.org/10.5121/ijcses.2022.13601.

Full text
Abstract:
Transaction records and other user information are stored in blocks that form a distributed ledger called blockchain. For blockchain to gain widespread adoption, it is crucial that user and transaction data be kept safe. This technology provides cryptographically safe and anonymous financial transactions among the user nodes of the network allowing the transactions to be evaluated and authorized by all the users in a transparent environment. In this paper, we provide a comprehensive overview and classification scheme for all cryptographic ideas currently used in blockchain. Moreover, the curre
APA, Harvard, Vancouver, ISO, and other styles
38

Nitaj, Abderrahmane, and Tajjeeddine Rachidi. "Applications of Neural Network-Based AI in Cryptography." Cryptography 7, no. 3 (2023): 39. http://dx.doi.org/10.3390/cryptography7030039.

Full text
Abstract:
Artificial intelligence (AI) is a modern technology that allows plenty of advantages in daily life, such as predicting weather, finding directions, classifying images and videos, even automatically generating code, text, and videos. Other essential technologies such as blockchain and cybersecurity also benefit from AI. As a core component used in blockchain and cybersecurity, cryptography can benefit from AI in order to enhance the confidentiality and integrity of cyberspace. In this paper, we review the algorithms underlying four prominent cryptographic cryptosystems, namely the Advanced Encr
APA, Harvard, Vancouver, ISO, and other styles
39

Mathew Sebastian. "Cryptographic milestones: Origins, modern algorithms, and the quantum era." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 387–93. https://doi.org/10.30574/wjaets.2025.15.2.0561.

Full text
Abstract:
Cryptography has played a pivotal role in securing communication across human history. From ancient techniques such as hieroglyphic substitutions and Caesar's cipher to contemporary cryptographic systems like RSA and Elliptic Curve Cryptography, the field has continuously adapted to evolving technological paradigms. This article provides a comprehensive review of the historical development of cryptography, highlighting key milestones from ancient Egypt and Mesopotamia, through the mechanical encryption devices of World War II, to the theoretical foundations established by Claude Shannon. It ex
APA, Harvard, Vancouver, ISO, and other styles
40

Krishnamoorthy. V and Marikkannan.M. "Systematic study on vulnerabilities, countermeasures and security analysis tools for cryptocurrencies and post quantum cryptographic approach to design quantum resistant blockchains." International Journal of Science and Research Archive 13, no. 2 (2024): 1416–33. http://dx.doi.org/10.30574/ijsra.2024.13.2.2284.

Full text
Abstract:
Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in the last years and their use has been suggested for numerous applications due to their ability to provide transparency, redundancy and accountability. Public key cryptography and hash functions provide security to blockchains, smart contracts and cryptocurrencies. Fast progress in Quantum computing presents significant threats to blockchain systems as it has leveraged possibility of attacking cryptosecurity systems in near future forcing re-design of blockchains to withstand quantum attacks and vulnerabil
APA, Harvard, Vancouver, ISO, and other styles
41

Neethu V A and Mohammad Akram Khan. "Securing Data Privacy and Integrity in Cloud Computing Using Blockchain and Quantum Cryptography." Metallurgical and Materials Engineering 31, no. 4 (2025): 137–45. https://doi.org/10.63278/1415.

Full text
Abstract:
Data privacy and integrity maintenance becomes more difficult as cloud computing expands. Such complex and advanced cyberattacks need for stronger and better defenses than traditional security measures can offer. A research paper that combines blockchain technology with quantum cryptography to improve data security in the cloud paradigm. In addition, aspects of blockchain itself – its distributed and cryptographically verified ledger – offer the possibility of transparency and immutability of the life of the data. Excited by that? Unlike this, Quantum Cryptography applies the concepts of quant
APA, Harvard, Vancouver, ISO, and other styles
42

Zheng, Xiaoying, Yongxin Zhu, and Xueming Si. "A Survey on Challenges and Progresses in Blockchain Technologies: A Performance and Security Perspective." Applied Sciences 9, no. 22 (2019): 4731. http://dx.doi.org/10.3390/app9224731.

Full text
Abstract:
Blockchain naturally fits multiple industry sectors due its characteristics of decentralization, enhanced security, tamper-proof, improved traceability and transparency. However, there is a significant concern of blockchain’s performance, since blockchain trades off its performance for a completely distributed feature, which enhances its security. In this paper, we investigate the state-of-the-art progress of blockchain, mainly from a performance and security perspective. We extracted 42 primary papers from major scientific databases and 34 online technical articles. The objective is to unders
APA, Harvard, Vancouver, ISO, and other styles
43

Singh, Sanket. "Evidence Vault." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem33349.

Full text
Abstract:
Ensuring the integrity of evidence is paramount within the realm of digital forensics. The preservation of evidence gathered at a crime scene is essential for concluding investigations and delivering justice to those involved. Hence, it is imperative to safeguard this evidence from any form of tampering. The process that upholds the reliability of evidence is known as the "chain of custody." Failure to maintain the chain of custody can render the evidence inadmissible in court, potentially resulting in the dismissal of the case. To address these challenges and promote an eco-friendly approach,
APA, Harvard, Vancouver, ISO, and other styles
44

Aydın, Baran Alp. "Cryptographic Algorithms in Decentralized Finance." Next Generation Journal for The Young Researchers 8, no. 1 (2025): 171. https://doi.org/10.62802/6hhm6713.

Full text
Abstract:
Cryptographic algorithms form the backbone of decentralized finance (DeFi), ensuring secure, transparent, and tamper-proof transactions in blockchain ecosystems. These algorithms enable critical functionalities such as digital signatures, consensus mechanisms, and privacy preservation, empowering decentralized platforms to operate without intermediaries. This paper explores the role of cryptographic techniques, including asymmetric encryption, hash functions, and zero-knowledge proofs, in enabling DeFi applications like smart contracts, tokenization, and decentralized exchanges. Additionally,
APA, Harvard, Vancouver, ISO, and other styles
45

Premsai, Ranga. "IMPLEMENTING IDENTITY AND ACCESS MANAGEMENT FOR IMPROVING CYBER SECURITY." International Scientific Journal of Engineering and Management 03, no. 12 (2024): 1–7. https://doi.org/10.55041/isjem01283.

Full text
Abstract:
Smart Banking Cyber-Physical Systems (SBCPS) face significant risks from various forms of financial fraud, including suspicious transactions, forgery, and identity theft. Traditional fraud detection methods often struggle to provide timely and reliable solutions. To address this, this study proposes an advanced fraud detection system based on a blockchain-enabled smart contract framework, integrating dual cryptographic algorithms: the Secure Asymmetric Hash Encryption Algorithm (SAHEA) and the Triple Integrity Twofish Algorithm (TITFA). The SAHEA ensures secure transaction data encryption usin
APA, Harvard, Vancouver, ISO, and other styles
46

Liang, Yuheng. "A research on applications of neural network-based cryptography." Applied and Computational Engineering 14, no. 1 (2023): 258–64. http://dx.doi.org/10.54254/2755-2721/14/20230798.

Full text
Abstract:
With the rapid development of neural networks, they have been integrated into more and more fields, and cryptography is no exception. Research on the combination of neural networks and cryptography is developing rapidly, and numerous scholars have made significant progress in these fields. Neural network-based cryptography is a complex system that deserves an in-depth study. This paper will first introduce the foundation types of neural networks, some of the other types of neural network , and cryptographic techniques. Immediately after, this paper will introduce the scheme of Generative Adver
APA, Harvard, Vancouver, ISO, and other styles
47

Wang, Xuyang. "Blockchain security and applications: A comprehensive analysis from hash functions to consensus algorithms." Theoretical and Natural Science 31, no. 1 (2024): 292–98. http://dx.doi.org/10.54254/2753-8818/31/20240862.

Full text
Abstract:
This article delves into the inherent security of blockchain technology by evaluating the sophisticated techniques it employs. Key among these are mathematical hash functions, elliptic curve cryptography, and zero-knowledge proofs. Mathematical hash functions ensure that data stored is immutable; any slight alteration to the information will lead to a drastically different hash output, making any tampering evident. Elliptic curve cryptography provides a robust encryption mechanism, ensuring that data transactions remain confidential and secure. Meanwhile, zero-knowledge proofs enable one party
APA, Harvard, Vancouver, ISO, and other styles
48

Chokyi, Tenzin. "Secure File Storage on Cloud Using Hybrid Cryptography." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47521.

Full text
Abstract:
Abstract The exponential growth of cloud computing is the reason that people and organizations store and then access their data. Primary concerns persist regarding data's security as well as integrity stored in cloud environments because of cyber-attacks' increasing threat landscape. Elliptic Curve Cryptography (ECC) combines with ChaCha20 for secure key exchange; an efficient stream cipher, and blockchain technology ensures tamper-proof file integrity verification in this paper proposing a novel security framework for cloud file storage. ChaCha20 resists against cryptographic attacks and then
APA, Harvard, Vancouver, ISO, and other styles
49

HarshalKumar Patil, Prof. "Online Voting System Using Blockchain: A Secure and Transparent Approach." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50471.

Full text
Abstract:
Abstract - Blockchain technology has emerged as a practical solution for secure and transparent digital voting systems. Traditional voting systems, especially online voting methods, often face security risks like hacking, tampering, and vote manipulation. Maintaining voter anonymity and ensuring data integrity are also major challenges. Blockchain, with its distributed and unchanged able ledger, offers solutions by providing a secure and decentralized way to record votes. This paper looks at the structure, implementation, and bene f its of a blockchain-based online voting system that uses bloc
APA, Harvard, Vancouver, ISO, and other styles
50

Lemieux, Victoria L. "Blockchain and Recordkeeping: Editorial." Computers 10, no. 11 (2021): 135. http://dx.doi.org/10.3390/computers10110135.

Full text
Abstract:
Distributed ledger technologies (DLT), including blockchains, combine the use of cryptography and distributed networks to achieve a novel form of records creation and keeping designed for tamper-resistance and immutability. Over the past several years, these capabilities have made DLTs, including blockchains, increasingly popular as a general-purpose technology used for recordkeeping in a variety of sectors and industry domains, yet many open challenges and issues, both theoretical and applied, remain. This editorial introduces the Special Issue of Computers focusing on exploring the frontiers
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!