News
An attack on a fundamental proof technique reveals a glaring security issue for blockchains and other digital encryption ...
In this paper, we investigate the effects of violating the conditions of hash function uniformity and/or independence on the false positive probability of Bloom Filters (BF). To this end, we focus on ...
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main aim of this paper is how to increase the security level of the blockchain based on the increasing hashing ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results