In Proof-of-Work (PoW) systems, a 51% attack happens when an attacker controls more than half of the blockchain’s hashing ...
Abstract: Spintronics-based devices for hardware security primitives have gained much interest due to their unique physical characteristics. In this work, the Cryptographic hash function (CHF) ...
Abstract: Hash functions today are ubiquitous in nearly all kinds of cryptographic applications. They can be found at the core of digital fingerprinting or watermarking and even in block or stream ...