Academic literature on the topic 'Merkle Trees'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Merkle Trees.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Merkle Trees"
Kachko, O., and D. Televnyi. "The Kupyna hash function cryptanalysis with Merkle Trees Signature schemes." Radiotekhnika, no. 195 (December 28, 2018): 27–31. http://dx.doi.org/10.30837/rt.2018.4.195.03.
Full textWang, Xinyue, Weifan Lin, Weiting Zhang, Yiwen Huang, Zeyu Li, Qian Liu, Xinze Yang, Yifan Yao, and Chunli Lv. "Integrating Merkle Trees with Transformer Networks for Secure Financial Computation." Applied Sciences 14, no. 4 (February 8, 2024): 1386. http://dx.doi.org/10.3390/app14041386.
Full textHe, Zichen. "Authenticating Account Balances in the Bitcoin Ecosystem via Merkle Trees." Highlights in Science, Engineering and Technology 85 (March 13, 2024): 494–500. http://dx.doi.org/10.54097/99pz5e96.
Full textKachko, O. G., and D. Televnyi. "THE KUPYNA HASH FUNCTION CRYPTANALYSIS WITH THE MERKLE TREES SIGNATURE SCHEMES." Telecommunications and Radio Engineering 78, no. 8 (2019): 683–89. http://dx.doi.org/10.1615/telecomradeng.v78.i8.40.
Full textMartínez, Víctor Gayoso, Luis Hernández-Álvarez, and Luis Hernández Encinas. "Analysis of the Cryptographic Tools for Blockchain and Bitcoin." Mathematics 8, no. 1 (January 15, 2020): 131. http://dx.doi.org/10.3390/math8010131.
Full textZajac, Pavol. "Ephemeral Keys Authenticated with Merkle Trees and Their Use in IoT Applications." Sensors 21, no. 6 (March 13, 2021): 2036. http://dx.doi.org/10.3390/s21062036.
Full textZou, Yu, Kazi Abu Zubair, Mazen Alwadi, Rakin Muhammad Shadab, Sanjay Gandham, Amro Awad, and Mingjie Lin. "ARES: Persistently Secure Non-Volatile Memory with Processor-transparent and Hardware-friendly Integrity Verification and Metadata Recovery." ACM Transactions on Embedded Computing Systems 21, no. 1 (January 31, 2022): 1–32. http://dx.doi.org/10.1145/3492735.
Full textIavich, Maksim, Tamari Kuchukhidze, and Razvan Bocu. "A Post-Quantum Digital Signature Using Verkle Trees and Lattices." Symmetry 15, no. 12 (December 6, 2023): 2165. http://dx.doi.org/10.3390/sym15122165.
Full textGang, Feng, and DaHuan Wei. "Dynamic Deduplication Algorithm for Cross-User Duplicate Data in Hybrid Cloud Storage." Security and Communication Networks 2022 (July 22, 2022): 1–9. http://dx.doi.org/10.1155/2022/8354903.
Full textFerrer, Eduardo Castelló, Thomas Hardjono, Alex Pentland, and Marco Dorigo. "Secure and secret cooperation in robot swarms." Science Robotics 6, no. 56 (July 28, 2021): eabf1538. http://dx.doi.org/10.1126/scirobotics.abf1538.
Full textDissertations / Theses on the topic "Merkle Trees"
Östersjö, Rasmus. "Sparse Merkle Trees: Definitions and Space-Time Trade-Offs with Applications for Balloon." Thesis, Karlstads universitet, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-42913.
Full textSpik, Charlotta. "Using Hash Trees for Database Schema Inconsistency Detection." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254672.
Full textI detta arbete har två algoritmer utvecklats for att förbättra prestandan på processen att hitta skillnader mellan schemana genom att använda Merkle träd. Den första bygger ett hashträd från schemaversionen, och den andra jämför två hashträd för att hitta var förändringar har skett. Resultaten från prestandautvärderingen som gjorts på hashträdalgoritmen jämfört med nuvarande algoritm som används på Cisco där all data i schemat traverseras, visar att hashträdalgoritmen presterar signifikant bättre än algoritmen som traverserar all data i alla fall som testats, förutom då alla noder har ändrats i trädet. Förbättringsfaktorn är direkt kopplad till antalet noder som behöver traverseras för hashträdalgoritmen, vilket i sin tur beror på antalet förändringar som skett mellan versionerna och positioneringen i schemat av de noder som har förändrats. De exempelscenarior som har tagits från riktiga uppdateringar som har skett för existerande scheman visar att i genomsnitt behöver hashträdalgoritmen bara traversera 1,5% av noderna som den nuvarande algoritmen som används av Cisco måste traversera, och hashträdalgoritmen ger i genomsnitt en 200 gånger prestandaförbättring. Även i det värsta fallet för dessa uppdateringar tagna från verkliga scenarier presterade hashträdalgoritmen fem gånger bättre än algoritmen som traverserar all data i schemat.
Ouaarab, Salaheddine. "Protection du contenu des mémoires externes dans les systèmes embarqués, aspect matériel." Thesis, Paris, ENST, 2016. http://www.theses.fr/2016ENST0046/document.
Full textDuring the past few years, computer systems (Cloud Computing, embedded systems...) have become ubiquitous. Most of these systems use unreliable or untrusted storage (flash, RAM...)to store code or data. The confidentiality and integrity of these data can be threaten by hardware (spying on the communication bus between the processing component and the storage component) or software attacks. These attacks can disclose sensitive information to the adversary or disturb the behavior of the system. In this thesis, in the context of embedded systems, we focused on the attacks that threaten the confidentiality and integrity of data that are transmittedover the memory bus or that are stored inside the memory. Several primitives used to protect the confidentiality and integrity of data have been proposed in the literature, including Merkle trees, a data structure that can protect the integrity of data including against replay attacks. However, these trees have a large impact on the performances and the memory footprint of the system. In this thesis, we propose a solution based on variants of Merkle trees (hollow trees) and a modified cache management mechanism to greatly reduce the impact of the verification of the integrity. The performances of this solution have been evaluated both theoretically and in practice using simulations. In addition, a proof a security equivalence with regular Merkle treesis given. Finally, this solution has been implemented in the SecBus architecture which aims at protecting the integrity and confidentiality of the content of external memories in an embedded system. A prototype of this architecture has been developed and the results of its evaluation are given
Ouaarab, Salaheddine. "Protection du contenu des mémoires externes dans les systèmes embarqués, aspect matériel." Electronic Thesis or Diss., Paris, ENST, 2016. http://www.theses.fr/2016ENST0046.
Full textDuring the past few years, computer systems (Cloud Computing, embedded systems...) have become ubiquitous. Most of these systems use unreliable or untrusted storage (flash, RAM...)to store code or data. The confidentiality and integrity of these data can be threaten by hardware (spying on the communication bus between the processing component and the storage component) or software attacks. These attacks can disclose sensitive information to the adversary or disturb the behavior of the system. In this thesis, in the context of embedded systems, we focused on the attacks that threaten the confidentiality and integrity of data that are transmittedover the memory bus or that are stored inside the memory. Several primitives used to protect the confidentiality and integrity of data have been proposed in the literature, including Merkle trees, a data structure that can protect the integrity of data including against replay attacks. However, these trees have a large impact on the performances and the memory footprint of the system. In this thesis, we propose a solution based on variants of Merkle trees (hollow trees) and a modified cache management mechanism to greatly reduce the impact of the verification of the integrity. The performances of this solution have been evaluated both theoretically and in practice using simulations. In addition, a proof a security equivalence with regular Merkle treesis given. Finally, this solution has been implemented in the SecBus architecture which aims at protecting the integrity and confidentiality of the content of external memories in an embedded system. A prototype of this architecture has been developed and the results of its evaluation are given
Lindqvist, Anton. "Privacy Preserving Audit Proofs." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-210694.
Full textDen ökande avlastningen av kritisk funktionalitet till datorer ställer högre krav på loggning och möjlighet till övervakning. Loggen måste vara resistent mot manipulation och möjliggöra för andra parter att ställa frågor berörande en viss händelse i loggen utan att läcka känslig information. Eftersom loggen inte antas vara att lita på måste varje svar vara verifierbart med hjälp av ett bevis. Denna rapport presenterar ett protokoll kapabelt till att producera verifierbara och integritetsbevarande svar på frågor om en viss händelse i loggen genom användning av Merkle-träd. Vid avsaknad av den förfrågade händelsen används ny metod för att autentisera ett Bloom filter med hjälp av Merkle-träd. Eftersom Bloom filtren är en probabilistisk konstruktion presenteras även en metod för att hantera falsk positiva svar.
Kruber, Nico. "Approximate Distributed Set Reconciliation with Defined Accuracy." Doctoral thesis, Humboldt-Universität zu Berlin, 2020. http://dx.doi.org/10.18452/21294.
Full textThe objective comparison of approximate versioned set reconciliation algorithms is challenging. Each algorithm's behaviour can be tuned for a given use case, e.g. low bandwidth or computational overhead, using different sets of parameters. Changes of these parameters, however, often also influence the algorithm's accuracy in recognising differences between participating sets and thus hinder objective comparisons based on the same level of accuracy. We develop a method to fairly compare approximate set reconciliation algorithms by enforcing a fixed accuracy and deriving accuracy-influencing parameters accordingly. We show this method's universal applicability by adopting two trivial hash-based algorithms as well as set reconciliation with Bloom filters and Merkle trees. Compared to previous research on Merkle trees, we propose to use dynamic hash sizes to align the transfer overhead with the desired accuracy and create a new Merkle tree reconciliation algorithm with an adjustable accuracy target. An extensive evaluation of each algorithm under this accuracy model verifies its feasibility and ranks these four algorithms. Our results allow to easily choose an efficient algorithm for practical set reconciliation tasks based on the required level of accuracy. Our way to find configuration parameters for different, yet equally accurate, algorithms can also be adopted to other set reconciliation algorithms and allows to rate their respective performance in an objective manner. The resultant new approximate Merkle tree reconciliation broadens the applicability of Merkle trees and sheds some new light on its effectiveness.
Brown, Jordan Lee. "Verifiable and redactable medical documents." Thesis, Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44890.
Full textFredriksson, Bastian. "A Distributed Public Key Infrastructure for the Web Backed by a Blockchain." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-210912.
Full textUppsatsen undersöker hur en blockkedja kan användas för att bygga en decentraliserad publik nyckel-infrastruktur för webben. Vi ger ett designförslag på en blockkedja som drivs av en pålitlig grupp av noder, där en majoritet antas vara ärliga. Vårt huvudsakliga bidrag är utformningen av ett Proof of Stake-protokoll baserat på ett staketräd, vilket bygger på en idé som kallas follow-the-satoshi omnämnd i tidigare publikationer. Digitala identiteter sparas i ett autentiserat, självbalanserande träd som underhålls av noder anslutna till blockkedjenätverket. Våra preliminära beräkningar baserade på storleken av DNS-systemet visar att blockstorleken måste sättas till åtminstone 5.2 MB, medan varje nod med en månads transaktionshistorik måste spara ungefär 243 GB. Webbläsare och andra resurssnåla klienter måste synkronisera 13.6 MB data per år, och ladda ner ytterligare 3.7 KB för varje användarcertifikat som skall valideras.
Saikia, Himangshu. "Comparison and Tracking Methods for Interactive Visualization of Topological Structures in Scalar Fields." Doctoral thesis, KTH, Beräkningsvetenskap och beräkningsteknik (CST), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-216375.
Full textQC 20171020
Kovář, Adam. "Bezpečná implementace technologie blockchain." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413104.
Full textBooks on the topic "Merkle Trees"
Department of Defense. Cryptocurrency and State Sovereignty - Comprehensive Review of Bitcoin, Blockchain, and Virtual Currency Technology, Hash Functions, Merkle Trees, and Security, Government Bans and Regulations. Independently Published, 2018.
Find full textSainsbury, Mark. Nonspecificity. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198803348.003.0005.
Full textMendola, Joseph. Experience and Possibility. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198869764.001.0001.
Full textGunderson, Erik. The Art of Complicity in Martial and Statius. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780192898111.001.0001.
Full textConway, Stephen. Ambitions and Opportunities. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198808701.003.0004.
Full textGriffel, Frank. Al-Ghazālī’s (d. 1111). Edited by Khaled El-Rouayheb and Sabine Schmidtke. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199917389.013.8.
Full textWest, John. Enthusiasm and Political Crisis. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198816409.003.0003.
Full textRuggles, D. Fairchild. Tree of Pearls. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190873202.001.0001.
Full textTaiz, Lincoln, and Lee Taiz. Flora Unveiled. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190490263.001.0001.
Full textPearce, Kenneth L. Language and the Structure of Berkeley's World. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780198790334.001.0001.
Full textBook chapters on the topic "Merkle Trees"
Garewal, Karan Singh. "Merkle Trees." In Practical Blockchains and Cryptocurrencies, 137–48. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5893-4_10.
Full textCarminati, Barbara. "Merkle Trees." In Encyclopedia of Database Systems, 1–2. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_1492-2.
Full textCarminati, Barbara. "Merkle Trees." In Encyclopedia of Database Systems, 1714–15. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_1492.
Full textCarminati, Barbara. "Merkle Trees." In Encyclopedia of Database Systems, 2231–32. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_1492.
Full textGaldi, Clemente. "Merkle Trees." In Encyclopedia of Cryptography, Security and Privacy, 1–3. Berlin, Heidelberg: Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_1787-1.
Full textDahlberg, Rasmus, Tobias Pulls, and Roel Peeters. "Efficient Sparse Merkle Trees." In Secure IT Systems, 199–215. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47560-8_13.
Full textRiposo, Julien. "On Improving the Merkle Trees: The n-Trees." In Some Fundamentals of Mathematics of Blockchain, 89–104. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-31323-3_6.
Full textOgawa, Mizuhito, Eiichi Horita, and Satoshi Ono. "Proving Properties of Incremental Merkle Trees." In Automated Deduction – CADE-20, 424–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11532231_31.
Full textKermezis, Georgios, Konstantinos Limniotis, and Nicholas Kolokotronis. "User-Generated Pseudonyms Through Merkle Trees." In Privacy Technologies and Policy, 89–105. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-76663-4_5.
Full textBailey, Bolton, and Suryanarayana Sankagiri. "Merkle Trees Optimized for Stateless Clients in Bitcoin." In Lecture Notes in Computer Science, 451–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-662-63958-0_35.
Full textConference papers on the topic "Merkle Trees"
Paris, Jehan-Francois, and Thomas Schwarz. "Merkle Hash Grids Instead of Merkle Trees." In 2020 28th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS). IEEE, 2020. http://dx.doi.org/10.1109/mascots50786.2020.9285942.
Full textCastellon, Cesar, Swapnoneel Roy, Patrick Kreidl, Ayan Dutta, and Ladislau Boloni. "Energy Efficient Merkle Trees for Blockchains." In 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2021. http://dx.doi.org/10.1109/trustcom53373.2021.00149.
Full textMunoz, Melesio Calderon, Melody Moh, and Teng-Sheng Moh. "Improving smart grid authentication using Merkle Trees." In 2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2014. http://dx.doi.org/10.1109/padsw.2014.7097884.
Full textMunoz, Melesio Calderon, Melody Moh, and Teng-Sheng Moh. "Improving smart grid security using Merkle Trees." In 2014 IEEE Conference on Communications and Network Security (CNS). IEEE, 2014. http://dx.doi.org/10.1109/cns.2014.6997535.
Full textNakamura, Yuta, Raza Ahmad, and Tanu Malik. "Content-defined Merkle Trees for Efficient Container Delivery." In 2020 IEEE 27th International Conference on High Performance Computing, Data, and Analytics (HiPC). IEEE, 2020. http://dx.doi.org/10.1109/hipc50609.2020.00026.
Full textAhmad, Asma'a, Majeed Alajeely, and Robin Doss. "Establishing trust relationships in OppNets using Merkle trees." In 2016 8th International Conference on Communication Systems and Networks (COMSNETS). IEEE, 2016. http://dx.doi.org/10.1109/comsnets.2016.7440025.
Full textEl-Hindi, Muhammad, Tobias Ziegler, and Carsten Binnig. "Towards Merkle Trees for High-Performance Data Systems." In VDBS 2023: Workshop on Verifiable Database Systems. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3595647.3595651.
Full textZhou, Li, and Chinya Ravishankar. "Dynamic Merkle Trees for Verifying Privileges in Sensor Networks." In 2006 IEEE International Conference on Communications. IEEE, 2006. http://dx.doi.org/10.1109/icc.2006.255109.
Full textAdhikari, Naresh, Naila Bushra, and Mahalingam Ramkumar. "Complete Merkle Hash Trees for Large Dynamic Spatial Data." In 2019 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 2019. http://dx.doi.org/10.1109/csci49370.2019.00246.
Full textOuaarab, Salaheddine, Guillaume Duc, and Renaud Pacalet. "Performance optimizations of integrity checking based on Merkle trees." In ISCA '15: The 42nd Annual International Symposium on Computer Architecture. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2768566.2768576.
Full textReports on the topic "Merkle Trees"
Simelton, Elisabeth, Rachmat Mulia, Clement Rigal, Tuan Minh Duong, Phuong Mai Nguyen, Hanna North, and Xuan Hieu Le. Beyond carbon sequestration – local knowledge about tree functions. Case study from male and female Arabica coffee farmers in Vietnam. World Agroforestry, 2021. http://dx.doi.org/10.5716/wp21025.pdf.
Full textCooper, David A., Daniel C. Apon, Quynh H. Dang, Michael S. Davidson, Morris J. Dworkin, and Carl A. Miller. Recommendation for Stateful Hash-Based Signature Schemes. National Institute of Standards and Technology, October 2020. http://dx.doi.org/10.6028/nist.sp.800-208.
Full textAyers, Dotson, and Alexander. L52332 Offshore Pipeline Damage Emergency Response Guidelines. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), July 2012. http://dx.doi.org/10.55274/r0010016.
Full text