{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T02:37:36Z","timestamp":1771036656438,"version":"3.50.1"},"reference-count":195,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"NTNU Research Project","award":["81771158"],"award-info":[{"award-number":["81771158"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2946983","type":"journal-article","created":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T19:55:56Z","timestamp":1570823756000},"page":"148550-148575","source":"Crossref","is-referenced-by-count":125,"title":["SoK of Used Cryptography in Blockchain"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5479-5748","authenticated-orcid":false,"given":"Mayank","family":"Raikwar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7078-6139","authenticated-orcid":false,"given":"Danilo","family":"Gligoroski","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1791-4434","authenticated-orcid":false,"given":"Katina","family":"Kralevska","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","article-title":"Witnet: A decentralized oracle network protocol","author":"de pedro","year":"2017","journal-title":"arXiv 1711 09756"},{"key":"ref172","author":"binstock","year":"2003","journal-title":"Obfuscation Cloaking Your Code From Prying Eyes"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700401"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_26"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_28"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_31"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/SFFCS.1999.814584"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67816-0_17"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3007788.3007790"},{"key":"ref38","first-page":"889","article-title":"A provably secure proof-of-stake blockchain protocol","author":"kiayias","year":"2016","journal-title":"Proc IACR Cryptol ePrint Arch"},{"key":"ref33","first-page":"45","article-title":"Bitcoin-NG: A scalable blockchain protocol","author":"eyal","year":"2016","journal-title":"Proc NSDI"},{"key":"ref32","article-title":"Consensus in the age of blockchains","author":"bano","year":"2017","journal-title":"arXiv 1711 03936"},{"key":"ref31","year":"2018","journal-title":"ProgPoW&#x2014;A Programmatic Proof of Work"},{"key":"ref30","author":"duffield","year":"2018","journal-title":"Dash A Payments-Focused Cryptocurrency"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"ref36","author":"kwon","year":"2014","journal-title":"Tendermint Consensus without Mining"},{"key":"ref35","first-page":"1","author":"ren","year":"2014","journal-title":"Proof of Stake Velocity Building the Social Currency of the Digital Age"},{"key":"ref34","article-title":"Casper the friendly finality gadget","author":"buterin","year":"2017","journal-title":"arXiv 1710 09437"},{"key":"ref181","first-page":"712","article-title":"A survey of two verifiable delay functions","author":"boneh","year":"2018","journal-title":"Proc IACR Cryptol ePrint Arch"},{"key":"ref180","first-page":"1","article-title":"Proofs-of-delay and randomness beacons in ethereum","author":"b\u00fcnz","year":"2017","journal-title":"Proc IEEE Secur Privacy Blockchain (IEEE S&B)"},{"key":"ref185","first-page":"97","article-title":"Reviving the idea of incremental cryptography for the zettabyte era use case: Incremental hash functions based on SHA-3","author":"mihajloska","year":"2015","journal-title":"Proc Int Workshop Open Problems Netw Secur"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48658-5_22"},{"key":"ref183","first-page":"250","article-title":"White-box cryptography and an AES implementation","author":"chow","year":"2002","journal-title":"Proc Int Workshop Sel Areas Cryptogr"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006763"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.05.005"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0057-3"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17253-4_14"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76900-2_12"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7764"},{"key":"ref27","author":"buterin","year":"2013","journal-title":"QuarkCoin Noble Intentions Wrong Approach"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_25"},{"key":"ref29","first-page":"1","article-title":"Cryptographic hash function blue midnight wish","author":"gligoroski","year":"2009","journal-title":"Proc of 1st International Workshop on Security and Communication Networks"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7620"},{"key":"ref22","article-title":"Iota vulnerability report: Cryptanalysis of the curl hash function enabling practical signature forgery attacks on the iota cryptocurrency","author":"heilman","year":"2017"},{"key":"ref21","first-page":"344","article-title":"Cryptanalysis of curl-P and other attacks on the IOTA cryptocurrency","author":"heilman","year":"2019","journal-title":"Proc IACR Cryptol ePrint Arch"},{"key":"ref24","article-title":"Stronger key derivation via sequential memory-hard functions","author":"percival","year":"2009"},{"key":"ref23","author":"lee","year":"2011","journal-title":"Litecoin"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/978-3-540-68351-3_8","article-title":"The Salsa20 family of stream ciphers","author":"bernstein","year":"2008","journal-title":"New Stream Cipher Designs"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2104"},{"key":"ref50","article-title":"Analysis of bitcoin pooled mining reward systems","author":"rosenfeld","year":"2011","journal-title":"arXiv 1112 4980"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2229012.2229022"},{"key":"ref154","article-title":"Homomorphic mini-blockchain scheme","author":"fran\u00e7a","year":"2015"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2018.8503089"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_10"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_9"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2017.50"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref151","article-title":"The keep network: A privacy layer for public blockchains","author":"luongo","year":"2018"},{"key":"ref146","article-title":"Decentralized user-centric access control using pubsub over blockchain","author":"hashemi","year":"2017","journal-title":"arXiv 1710 00110"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00272"},{"key":"ref149","author":"bernstein","year":"2014","journal-title":"CAESAR Competition for Authenticated Encryption Security Applicability and Robustness"},{"key":"ref59","author":"greenspan","year":"2015","journal-title":"MultiChain Private Blockchain"},{"key":"ref58","year":"2014","journal-title":"Monax"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"ref56","year":"2014","journal-title":"Blockchain for Decentralized Workflows"},{"key":"ref55","year":"2017","journal-title":"EOS IO Technical White Paper"},{"key":"ref54","author":"britto","year":"2012","journal-title":"Ripple"},{"key":"ref53","year":"2014","journal-title":"Monero"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69084-1_19"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_4"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_6"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_8"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00213"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.68.733"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660310"},{"key":"ref4","first-page":"139","article-title":"Pricing via processing or combatting junk mail","author":"dwork","year":"1992","journal-title":"Proc Annu Int Cryptol Conf"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"ref6","author":"hughes","year":"1993","journal-title":"A cypherpunk's manifesto"},{"key":"ref5","article-title":"Time-lock puzzles and timed-release crypto","author":"rivest","year":"1996"},{"key":"ref8","author":"dai","year":"1998","journal-title":"B-money"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"ref7","author":"back","year":"2003","journal-title":"The Hashcash Proof-of-Work Function"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2940716.2940773"},{"key":"ref157","first-page":"187","article-title":"How to exchange secrets with oblivious transfer","author":"rabin","year":"2005","journal-title":"Proc IACR Cryptol ePrint Arch"},{"key":"ref9","author":"szabo","year":"2005","journal-title":"Bit Gold"},{"key":"ref158","article-title":"Raziel: Private and verifiable smart contracts on blockchains","author":"s\u00e1nchez","year":"2018","journal-title":"arXiv 1807 09484"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.5195\/LEDGER.2017.48"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_10"},{"key":"ref48","author":"schwartz","year":"2014","journal-title":"The Ripple protocol consensus algorithm"},{"key":"ref47","first-page":"173","article-title":"Practical Byzantine fault tolerance","volume":"99","author":"castro","year":"1999","journal-title":"Proc OSDI"},{"key":"ref42","author":"duffield","year":"2014","journal-title":"Transaction Locking and Masternode Consensus A Mechanism for Mitigating Double Spending Attacks"},{"key":"ref41","first-page":"919","article-title":"Snow white: Provably secure proofs of stake","author":"bentov","year":"2016","journal-title":"Proc IACR Cryptol ePrint Arch"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"ref43","year":"2019","journal-title":"The Libra Blockchain"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2329872"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ISTC.2016.7593121"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2208937"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2749255"},{"key":"ref76","article-title":"Bitcoin exchange MT GOX files for bankruptcy protection","volume":"28","author":"mclannahan","year":"2014","journal-title":"Financial Times"},{"key":"ref77","author":"huillet","year":"2019","journal-title":"Vitalik Buterin Talks Scalability Ethereum Blockchain is Almost Full"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2017.162"},{"key":"ref75","first-page":"383","article-title":"The market for cryptocurrencies","volume":"35","author":"white","year":"2015","journal-title":"J Cat"},{"key":"ref78","year":"2019","journal-title":"BEAM"},{"key":"ref79","author":"rolfe","year":"2019","journal-title":"Turing Completeness and Smart Contract Security"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_5"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.29"},{"key":"ref61","first-page":"129","article-title":"Eclipse attacks on bitcoin&#x2019;s peer-to-peer network","author":"heilman","year":"2015","journal-title":"Proc 24th USENIX Secur Symp (USENIX Security)"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/978-3-662-44774-1_5","article-title":"Empirical analysis of denial-of-service attacks in the bitcoin ecosystem","author":"vasek","year":"2014","journal-title":"Financial Cryptography and Data Security"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.14"},{"key":"ref66","year":"2012","journal-title":"Simplified payment verification"},{"key":"ref67","author":"skudnov","year":"2012","journal-title":"Bitcoin Clients"},{"key":"ref68","article-title":"SeF: A secure fountain architecture for slashing storage costs in blockchains","author":"kadhe","year":"2019","journal-title":"arXiv 1906 12140"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054295"},{"key":"ref193","year":"2019","journal-title":"ECDHM Address"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502000"},{"key":"ref195","article-title":"MixEth: Efficient, trustless coin mixing service for ethereum","author":"seres","year":"2019"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00020"},{"key":"ref94","article-title":"Aggregation of gamma-signatures and applications to bitcoin","author":"zhao","year":"2018"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70500-2_18"},{"key":"ref93","article-title":"Batching techniques for accumulators with applications to IOPs and stateless blockchains","author":"boneh","year":"2018"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17253-4_13"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46568-5_53"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_23"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1748"},{"key":"ref90","first-page":"43","article-title":"Blockchain and 5G-enabled Internet of Things (IoT) will redefine supply chains and trade finance","author":"dewey","year":"2018","journal-title":"Proc Secured Lender"},{"key":"ref98","article-title":"Wave: A decentralized authorization system for iot via blockchain smart contracts","author":"andersen","year":"2017"},{"key":"ref99","article-title":"Kadena: The first scalable, high performance private blockchain","author":"martino","year":"2016"},{"key":"ref96","author":"maxwell","year":"2015","journal-title":"Borromean ring signatures"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00191"},{"key":"ref82","first-page":"1","author":"poon","year":"2017","journal-title":"Plasma Scalable autonomous smart contracts"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978389"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.180089"},{"key":"ref83","author":"back","year":"2014","journal-title":"Enabling blockchain innovations with pegged sidechains"},{"key":"ref80","author":"poon","year":"2016","journal-title":"The bitcoin lightning network Scalable off-chain instant payments"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2018.043141672"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3111245"},{"key":"ref86","first-page":"1","article-title":"Atomic multi-channel updates with constant collateral in bitcoin-compatible payment-channel networks","author":"egger","year":"2019","journal-title":"Cryptology-eprint-archive"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23330"},{"key":"ref88","article-title":"Celer network: Bring Internet scale to every blockchain","author":"dong","year":"2018","journal-title":"arXiv 1810 00037"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00229"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7202806"},{"key":"ref127","author":"charlon","year":"0","journal-title":"OpenChain"},{"key":"ref126","author":"coverdale","year":"2018","journal-title":"Scaling Bitcoin Schnorr Signatures"},{"key":"ref125","year":"2012","journal-title":"Pay to Script Hash"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.34"},{"key":"ref129","first-page":"153","author":"chaum","year":"1984","journal-title":"Blind Signature Systems"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03329-3_15"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_9"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0015"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699100"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_4"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36178-2_33"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"ref135","article-title":"ShareLock: Mixing for cryptocurrencies from multiparty ECDSA","author":"shlomovits","year":"2019"},{"key":"ref138","author":"dale","year":"2019","journal-title":"The Vaul is Back Coder Revives Plan to Shield Bitcoin Wallets From Theft"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8032"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1007\/BF00195207"},{"key":"ref140","first-page":"781","article-title":"Succinct non-interactive zero knowledge for a von neumann architecture","author":"ben-sasson","year":"2014","journal-title":"Proc 23rd USENIX Secur Symp (USENIX Secur )"},{"key":"ref141","author":"morgan","year":"2016","journal-title":"Quorum\/Greenwood"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/OBD.2016.11"},{"key":"ref2","year":"2019","journal-title":"Total Market Capitalization"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0574-6"},{"key":"ref1","author":"nakamoto","year":"2009","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2017.080757"},{"key":"ref109","article-title":"Post-quantum blockchain using one-time signature chains","author":"van der linde","year":"2018"},{"key":"ref108","article-title":"Automated penalization of data breaches using crypto-augmented smart contracts","author":"mangipudi","year":"2018"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.036"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0021"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134010"},{"key":"ref104","article-title":"Obfuscation in bitcoin: Techniques and politics","author":"narayanan","year":"2017","journal-title":"arXiv 1706 05432"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700344"},{"key":"ref102","article-title":"LSB: A lightweight scalable blockchain for IoT security and privacy","author":"dorri","year":"2017","journal-title":"arXiv 1712 02969"},{"key":"ref111","article-title":"Quantum attacks on bitcoin, and how to protect against them","author":"aggarwal","year":"2017","journal-title":"arXiv 1710 10377"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.37"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2827203"},{"key":"ref10","author":"satoshi","year":"2010","journal-title":"RE They Want to Delete the Wikipedia Article"},{"key":"ref11","author":"wood","year":"2014","journal-title":"Ethereum A Secure Decentralised Generalised Transaction Ledger"},{"key":"ref12","year":"2016","journal-title":"The Ether Denominations are Called Finney Szabo and Wei What\/Who are These Named After?"},{"key":"ref13","author":"finney","year":"2013","journal-title":"Bitcoin and Me (Hal Finney)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48478-5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2842460"},{"key":"ref16","article-title":"A survey on consensus mechanisms and mining strategy management in blockchain networks","author":"wang","year":"2018","journal-title":"arXiv 1805 02707"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.11.003"},{"key":"ref117","article-title":"Enigma: Decentralized computation platform with guaranteed privacy","author":"zyskind","year":"2015","journal-title":"arXiv 1506 03471"},{"key":"ref18","first-page":"158","article-title":"The state of cryptographic hash functions","author":"preneel","year":"1998","journal-title":"School organized by the European Educational Forum"},{"key":"ref19","first-page":"183","article-title":"Secure hash standard (SHS)","volume":"180","author":"gallagher","year":"1995","journal-title":"FIPS PUB"},{"key":"ref119","author":"van saberhagen","year":"2013","journal-title":"Crypto"},{"key":"ref114","article-title":"Storj a peer-to-peer cloud storage network","author":"wilkinson","year":"2014"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/2833312.2833317"},{"key":"ref116","year":"2018","journal-title":"Wanchain"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194118"},{"key":"ref120","author":"cohen","year":"2017","journal-title":"Chia network"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78375-8_3"},{"key":"ref122","article-title":"DFINITY technology overview series, consensus system","author":"hanke","year":"2018","journal-title":"arXiv 1805 04548"},{"key":"ref123","first-page":"1","article-title":"Runtime self-protection in a trusted blockchain-inspired ledger","author":"liem","year":"2017","journal-title":"Proc Escar Europe"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08865045.pdf?arnumber=8865045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T15:13:29Z","timestamp":1695309209000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8865045\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":195,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2946983","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}