International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 0 | Views: 126

Research Paper | Computer Science | India | Volume 13 Issue 5, May 2024 | Popularity: 4.2 / 10


     

Blockchain Technology and Cryptography

Itisha Jain


Abstract: Blockchain technology, coupled with cryptography, has emerged as a transformative force across various industries, promising enhanced security, transparency, and efficiency in digital transactions. This research paper explores the foundational principles of blockchain technology and cryptography, their interplay, and their applications across different sectors. We delve into the mechanisms that underpin blockchain's decentralized nature, consensus algorithms, cryptographic hash functions, digital signatures, and smart contracts. Furthermore, we examine the challenges and opportunities posed by the integration of blockchain and cryptography and highlight potential future developments in this dynamic field.


Keywords: Blockchain, cryptography, hash function, proof - of - work, consensus, signature, encryption


Edition: Volume 13 Issue 5, May 2024


Pages: 1715 - 1717


DOI: https://www.doi.org/10.21275/SR24524003904



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Itisha Jain, "Blockchain Technology and Cryptography", International Journal of Science and Research (IJSR), Volume 13 Issue 5, May 2024, pp. 1715-1717, https://www.ijsr.net/getabstract.php?paperid=SR24524003904, DOI: https://www.doi.org/10.21275/SR24524003904



Similar Articles

Downloads: 0

Review Papers, Computer Science, Trinidad and Tobago, Volume 12 Issue 12, December 2023

Pages: 727 - 733

Securing Immersive Realms: A Review of Security Measures in 360-Degree Virtual Reality Video Streaming

Koffka Khan

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science, India, Volume 11 Issue 7, July 2022

Pages: 1564 - 1568

Performance Evaluation of Intrusion Detection System for Smart Devices using Neural Network Classifiers

Gopala B, Hanumanthappa M

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science, India, Volume 12 Issue 11, November 2023

Pages: 2145 - 2150

Ensuring Secure SaaS: Best Practices and Approaches for Integrating Security into Cloud - Based Applications

Gaurav Rohatgi

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science, Malawi, Volume 12 Issue 4, April 2023

Pages: 257 - 261

Secure and Efficient Data Transfer in AODV Routing Protocol Using RSA Encryption

Chatheka Ngazi Mangazi, Dr. Glorindal Selvam

Share this Article

Downloads: 6 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Research Paper, Computer Science, India, Volume 13 Issue 5, May 2024

Pages: 767 - 770

Establishing a Secure File Transfer Using Hybrid Cryptography and LSB Stenographic Techniques

K Annsheela, S Habeeb Mohamed Sathak Amina

Share this Article



Top