Search Results - "Crypto "
-
1
Crypto-to-Crypto Transactions: A Modern Quandary in Realisation Taxation
Published 2025“…The emergence of crypto assets as a disruptive technology has created significant challenges to tax systems around the world. …”
Get full text
-
2
Mischaracterised “Personal-Use” Crypto Assets
Published 2024“…In an environment lacking specific legislative guidance for crypto assets and with limited court cases testing the legal framework surrounding them, taxpayers often turn to the Australian Taxation Office (ATO) website for guidance. …”
Get full text
-
3
Coinhive's monero drive-by crypto-jacking
Published 2020“…This paper provides study of behaviour on a drive-by crypto-jacking, specifically Coinhive’s Monero. Crypto-jacking is a form of cyber threat where a host machine’s processing power hijacked thru infected website to solve cryptographic puzzles as an unwitting participant. …”
Get full text
-
4
-
5
Crypto Embedded System for Electronic Document
Published 2006“…In this paper, a development of low-cost RSA-based Crypto Embedded System targeted for electronic document security is presented. …”
Get full text
Get full text
-
6
-
7
-
8
-
9
A framework for the development of a National Crypto-Currency
Published 2018“…This paper seeks to provide a conceptual framework as to whether a central bank or a monetary authority should issue a crypto-currency given available technology and what are the consequences of doing so. …”
Get full text
Get full text
-
10
Crypto-currency bubbles: an application of the Phillips–Shi–Yu (2013) methodology on Mt. Gox bitcoin prices
Published 2015Subjects: “…crypto-currency…”
Get full text
-
11
Performance evaluation of lightweight Crypto functions for Internet of things applications
Published 2020“…The main LW crypto functions are Photon, Quark (QK), Spongent and Lesamnta. …”
Get full text
Get full text
Get full text
-
12
-
13
A true random number generator for crypto embedded systems
Published 2006“…In this paper, we design a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers. …”
Get full text
Get full text
-
14
Design of a high speed and low latency crypto-processor ASIC
Published 2008“…This paper presents the design of an ultra high speed crypto-processor for next generation IT security. …”
Get full text
Get full text
-
15
Verilog design of a 256-bit AES crypto processor core
Published 2007“…This thesis proposes a design of 256-bit AES crypto-processor core in Verilog RTL, by extending from previous UTM student’s research, targeted at FPGA implementation in System-on-Chip (SoC) designs. …”
Get full text
Get full text
-
16
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…For example, in bulk data transfer, especially in large messages, the secured processing time takes much longer than non-secured processes. This is due to crypto operations, which include symmetric encryption operations and hashing functions. …”
Get full text
Get full text
-
17
An embedded cryptosystem implementing symmetric cipher and public-key crypto algorithms in hardware
Published 2005“…The hybrid encryption cryptosystem offers a performance of 1.80 Mbps in AES crypto subsystem, and able to execute RSA full modular exponentiation operation in just 53 ms. …”
Get full text
Get full text
-
18
-
19
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007“…In bulk data transfer, especially in large messages, the secured processing time takes much longer than non-secured processes. This is due to crypto operations, which include symmetric encryption operations and hashing functions. …”
Get full text
Get full text
-
20
Shariah perspective on crypto as asset (Mal): justifying the needs of estate planning and inheritance of digital asset
Published 2023“…This study aims to analyze the crypto assets in the horizon of mal according to the shariah and further discuss the needs of estate planning and management of this digital asset. …”
Get full text
Get full text