GitHub, the de-facto platform for open-source software development, provides a set of social-media-like features to signal high-quality repositories.
Cryptography and Security Software Engineering
Our study is the first that is based on the entire body of deployed bytecode on Ethereum's main chain.
Cryptography and Security Software Engineering
The proposed framework consists of four components (i. e., an authenticator, a client, a hardware wallet, and a smart contract), and it provides 2-factor authentication (2FA) performed in two stages of interaction with the blockchain.
Cryptography and Security
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms and it is used as a proof-of-work function in several cryptocurrencies that aim to be ASIC-resistant.
Cryptography and Security Hardware Architecture Signal Processing
So-called Ethereum nodes operate the blockchain, relying on a vast supply chain of third-party software dependencies maintained by diverse organizations.
Software Engineering
We discover that one single entity is likely controlling the financial backbone of the majority of the sextortion campaigns and that the 11-month operation studied yielded a lower-bound revenue between \$1, 300, 620 and \$1, 352, 266.
Cryptography and Security
Our construction is also modular, making use of a generic abstraction from folklore, called the "state channel," which we are the first to formalize.
Cryptography and Security
Yield farming has been an immensely popular activity for cryptocurrency holders since the explosion of Decentralized Finance (DeFi) in the summer of 2020.
Distributed anonymity services, such as onion routing networks or cryptocurrency tumblers, promise privacy protection without trusted third parties.
Cryptography and Security Networking and Internet Architecture
In the open-source software (OSS) portal GitHub, we observe a growing adoption of Blockchain-based solutions.
Cryptography and Security Software Engineering