News

Today, hashing algorithms are employed in many applications for security purposes. Many developments have been made in the family of hashing algorithms, especially the SHA1 algorithm. Because of flaws ...
Blockchain, as a decentralized, secure, programmable, traceable, and tamper-resistant distributed ledger technology, has witnessed rapid development in various fields in recent years. This paper ...