Search Results - "Crypto "

Refine Results
  1. 1

    Crypto-to-Crypto Transactions: A Modern Quandary in Realisation Taxation by Allen, Christina, Parsons, Shaun

    Published 2025
    “…The emergence of crypto assets as a disruptive technology has created significant challenges to tax systems around the world. …”
    Get full text
  2. 2

    Mischaracterised “Personal-Use” Crypto Assets by Allen, Christina

    Published 2024
    “…In an environment lacking specific legislative guidance for crypto assets and with limited court cases testing the legal framework surrounding them, taxpayers often turn to the Australian Taxation Office (ATO) website for guidance. …”
    Get full text
  3. 3

    Coinhive's monero drive-by crypto-jacking by Azizah, Abdul Aziz, Syahrulanuar, Ngah, Yau, Ti Dun, Tan, Fui Bee

    Published 2020
    “…This paper provides study of behaviour on a drive-by crypto-jacking, specifically Coinhive’s Monero. Crypto-jacking is a form of cyber threat where a host machine’s processing power hijacked thru infected website to solve cryptographic puzzles as an unwitting participant. …”
    Get full text
  4. 4
  5. 5

    Crypto Embedded System for Electronic Document by Ahmad, Illiasaak, M.Thamrin, Norashikin, Hani, Mohamed Khalil

    Published 2006
    “…In this paper, a development of low-cost RSA-based Crypto Embedded System targeted for electronic document security is presented. …”
    Get full text
    Get full text
  6. 6
  7. 7
  8. 8
  9. 9

    A framework for the development of a National Crypto-Currency by Abdullah, Adam, Mohd Nor, Rizal

    Published 2018
    “…This paper seeks to provide a conceptual framework as to whether a central bank or a monetary authority should issue a crypto-currency given available technology and what are the consequences of doing so. …”
    Get full text
    Get full text
  10. 10
  11. 11
  12. 12
  13. 13

    A true random number generator for crypto embedded systems by M.Thamrin, Norashikin, Ahmad, Illiasaak, Hani, Mohamed Khalil

    Published 2006
    “…In this paper, we design a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers. …”
    Get full text
    Get full text
  14. 14

    Design of a high speed and low latency crypto-processor ASIC by Ali, Md. Liakot, Roy, Niranjan, Faisal, Fazle Elahi, Mohd Ali, Mohd Alauddin, Aris, Ishak

    Published 2008
    “…This paper presents the design of an ultra high speed crypto-processor for next generation IT security. …”
    Get full text
    Get full text
  15. 15

    Verilog design of a 256-bit AES crypto processor core by Lai, Yit Pin

    Published 2007
    “…This thesis proposes a design of 256-bit AES crypto-processor core in Verilog RTL, by extending from previous UTM student’s research, targeted at FPGA implementation in System-on-Chip (SoC) designs. …”
    Get full text
    Get full text
  16. 16

    Improving security performance with parallel crypto operations in SSL bulk data transfer by Alaidaros, Hashem Mohammed, Othman, Mohamed, A. Rasid, Mohd Fadlee

    Published 2009
    “…For example, in bulk data transfer, especially in large messages, the secured processing time takes much longer than non-secured processes. This is due to crypto operations, which include symmetric encryption operations and hashing functions. …”
    Get full text
    Get full text
  17. 17

    An embedded cryptosystem implementing symmetric cipher and public-key crypto algorithms in hardware by Hau, Yuan Wen

    Published 2005
    “…The hybrid encryption cryptosystem offers a performance of 1.80 Mbps in AES crypto subsystem, and able to execute RSA full modular exponentiation operation in just 53 ms. …”
    Get full text
    Get full text
  18. 18
  19. 19

    Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase by Alaidaros, Hashem Mohammed, A. Rasid, Mohd Fadlee, Othman, Mohamed, Raja Abdullah, Raja Syamsul Azmir

    Published 2007
    “…In bulk data transfer, especially in large messages, the secured processing time takes much longer than non-secured processes. This is due to crypto operations, which include symmetric encryption operations and hashing functions. …”
    Get full text
    Get full text
  20. 20

    Shariah perspective on crypto as asset (Mal): justifying the needs of estate planning and inheritance of digital asset by Norazlina Abd Wahab, Nur Syaedah Kamis, Zairy Zainol, Akhmad Affandi Mahfudz

    Published 2023
    “…This study aims to analyze the crypto assets in the horizon of mal according to the shariah and further discuss the needs of estate planning and management of this digital asset. …”
    Get full text
    Get full text