Consensus Approaches of High-Value Crypto Currencies and Application in SHA-3

dc.authoridEMEÇ, Murat/0000-0002-9407-1728
dc.authoridEMEÇ, Murat/0000-0002-9407-1728
dc.authoridDalkılıç, Gökhan/0000-0002-0130-1716
dc.authoridAlkim, Erdem/0000-0003-4638-2422
dc.authoridKaratay, Melike/0000-0001-6941-4752
dc.authorwosidALKIM, Erdem/HHD-1737-2022
dc.authorwosidEMEÇ, Murat/AFT-0930-2022
dc.authorwosidDalkılıç, Gökhan/B-8292-2014
dc.authorwosidEMEÇ, Murat/ACF-6411-2022
dc.authorwosidAlkim, Erdem/X-9220-2019
dc.contributor.authorEmec, Murat
dc.contributor.authorKaratay, Melike
dc.contributor.authorDalkilic, Gokhan
dc.contributor.authorAlkim, Erdem
dc.date.accessioned2023-01-12T19:49:58Z
dc.date.available2023-01-12T19:49:58Z
dc.date.issued2020
dc.departmentN/A/Departmenten_US
dc.descriptionInternational Conference on Artificial Intelligence and Applied Mathematics in Engineering (ICAIAME) -- APR 20-22, 2019 -- Antalya, TURKEYen_US
dc.description.abstractIn view of the widespread use of information technologies, the security of data against third parties should be maintained. Blockchain technology is used for this data and especially for transactions in finance. However, although bitcoin is well known as the crypto currency, the use of the blockchain technology is gaining importance in different areas as well. Thus, consensus algorithms have been developed in order to increase the security and especially the integrity of the crypto currencies. These consensus algorithms indirectly influence the market value of crypto currencies. In this study, consensus algorithms of some crypto currencies have been investigated. In addition to the SHA256 algorithm, the advantages and disadvantages of using Shake and Keccak algorithms as a part of the consensus algorithms, have been analyzed. SHA256, Keccak and Shake algorithms are compared regarding to their performance. As a result, we recommend that the cryptographic hash function can be replaced with the Shake algorithm can be an extendable output function for new crypto currencies.en_US
dc.identifier.doi10.1007/978-3-030-36178-5_46
dc.identifier.endpage583en_US
dc.identifier.isbn978-3-030-36178-5
dc.identifier.isbn978-3-030-36177-8
dc.identifier.issn2367-4512
dc.identifier.issn2367-4512en_US
dc.identifier.startpage572en_US
dc.identifier.urihttps://doi.org/10.1007/978-3-030-36178-5_46
dc.identifier.urihttps://hdl.handle.net/11454/75977
dc.identifier.volume43en_US
dc.identifier.wosWOS:000678771000046en_US
dc.identifier.wosqualityN/Aen_US
dc.indekslendigikaynakWeb of Scienceen_US
dc.language.isoenen_US
dc.publisherSpringer International Publishing Agen_US
dc.relation.ispartofArtificial Intelligence And Applied Mathematics In Engineering Problemsen_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectSecurityen_US
dc.subjectBlockchainen_US
dc.subjectConsensusen_US
dc.subjectCryptocurrencyen_US
dc.subjectHigh-value cryptoen_US
dc.subjectHash functionsen_US
dc.subjectShakeen_US
dc.subjectKeccaken_US
dc.titleConsensus Approaches of High-Value Crypto Currencies and Application in SHA-3en_US
dc.typeConference Objecten_US

Dosyalar