ANALISA KEMUNGKINAN ALGORITMA SHA256 & ALGORITMA SCRYPT DALAM MENEMUKAN BLOK BARU PADA TEKNOLOGI BLOCKCHAIN
Abstract
Keywords
Full Text:
PDFReferences
I. Eyal, A. E. Gencer, E. G. Sirer, and R. van Renesse, “Bitcoin-NG: A Scalable Blockchain Protocol,” CoRR, vol. abs/1510.02037, 2015, [Online]. Available: http://arxiv.org/abs/1510.02037.
R. Beck, J. S. Czepluch, N. Lollike, and S. Malone, “BLOCKCHAIN – THE GATEWAY TO TRUST-FREE CRYPTOGRAPHIC TRANSACTIONS,” Research Papers, May 2016, [Online]. Available: https://aisel.aisnet.org/ecis2016_rp/153.
A. Gervais, S. Capkun, G. O. Karame, and D. Gruber, “On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients,” in Proceedings of the 30th Annual Computer Security Applications Conference, New York, NY, USA, 2014, pp. 326–335, doi: 10.1145/2664243.2664267.
A. Gervais, G. O. Karame, K. Wüst, V. Glykantzis, H. Ritzdorf, and S. Capkun, “On the Security and Performance of Proof of Work Blockchains,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2016, pp. 3–16, doi: 10.1145/2976749.2978341.
J. Alwen, B. Chen, K. Pietrzak, L. Reyzin, and S. Tessaro, “Scrypt Is Maximally Memory-Hard,” in Advances in Cryptology – EUROCRYPT 2017, Cham, 2017, pp. 33–62.
L. Ertaul and M. Kaur, “Implementation and Performance Analysis of PBKDF 2 , Bcrypt , Scrypt Algorithms varunkrg.”
DOI: https://doi.org/10.24167/proxies.v2i1.3197
Copyright (c) 2021 PROXIES
View My Stats