Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (12)

Search Parameters:
Keywords = crypto-domains

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
15 pages, 1426 KB  
Article
Large Language Models for Nowcasting Cryptocurrency Market Conditions
by Anurag Dutta, M. Gayathri Lakshmi, A. Ramamoorthy and Pijush Kanti Kumar
FinTech 2025, 4(4), 53; https://doi.org/10.3390/fintech4040053 - 29 Sep 2025
Viewed by 2123
Abstract
Large language models have expanded their application from traditional tasks in natural language processing to several domains of science, technology, engineering, and mathematics. This research studies the potential of these models for financial “nowcasting”–real-time forecasting (of the recent past) for cryptocurrency [...] Read more.
Large language models have expanded their application from traditional tasks in natural language processing to several domains of science, technology, engineering, and mathematics. This research studies the potential of these models for financial “nowcasting”–real-time forecasting (of the recent past) for cryptocurrency market conditions. Further, the research benchmarks capabilities of five state-of-the-art decoder-only models, gpt-4.1 (OpenAI), gemini-2.5-pro (Google), claude-3-opus-20240229 (Anthropic), deepseek-reasoner (DeepSeek), and grok-4 (xAI) across 12 major crypto-assets around the world. Using minute-resolution history of a day in USD for the stocks, gemini-2.5-pro emerges as a consistent leader in forecasting (except for a few assets). The stablecoins exhibit minimal deviation across all models, justifying the “nowcast strength” in low-volatility environments, although they are not able to perform well for the highly erratic assets. Additionally, since large language models have been known to better their performance when executed for a higher number of passes, the experimentations were conducted for two passes (Pass@1 and Pass@2), and the respective nowcast errors are found to be reduced by 1.2156% (on average). Full article
Show Figures

Figure 1

24 pages, 664 KB  
Article
Temporal Fusion Transformer-Based Trading Strategy for Multi-Crypto Assets Using On-Chain and Technical Indicators
by Ming Che Lee
Systems 2025, 13(6), 474; https://doi.org/10.3390/systems13060474 - 16 Jun 2025
Cited by 3 | Viewed by 11364
Abstract
Cryptocurrency markets are characterized by high volatility, nonlinear dependencies, and limited transparency, making short-term forecasting particularly challenging for both researchers and practitioners. To address these complexities, this study introduces a Temporal Fusion Transformer (TFT)-based forecasting framework that integrates on-chain and technical indicators to [...] Read more.
Cryptocurrency markets are characterized by high volatility, nonlinear dependencies, and limited transparency, making short-term forecasting particularly challenging for both researchers and practitioners. To address these complexities, this study introduces a Temporal Fusion Transformer (TFT)-based forecasting framework that integrates on-chain and technical indicators to improve predictive performance and inform tactical trading decisions. By combining multi-source features—such as Spent Output Profit Ratio (SOPR), Total Value Locked (TVL), active addresses (AA), exchange net flow (ENF), Realized Cap HODL Waves, and the Crypto Fear and Greed Index—with classical signals like Relative Strength Index (RSI) and moving average convergence divergence (MACD), the model captures behavioral patterns, investor sentiment, and price dynamics in a unified structure. Five major cryptocurrencies—BTC, ETH, USDT, XRP, and BNB—serve as the empirical basis for evaluation. The proposed TFT model is benchmarked against LSTM, GRU, SVR, and XGBoost using standard regression metrics to assess forecasting accuracy. Beyond prediction, a signal-based trading strategy is developed by translating model outputs into daily buy, hold, or sell signals, with performance assessed through a comprehensive set of financial metrics. The results suggest that integrating attention-based deep learning with domain-informed indicators provides an effective and interpretable approach for multi-asset cryptocurrency forecasting and real-time portfolio strategy optimization. Full article
Show Figures

Figure 1

30 pages, 7062 KB  
Article
Exploring the Use of Crypto-Assets for Payments
by Eleni Koutrouli and Polychronis Manousopoulos
FinTech 2025, 4(2), 15; https://doi.org/10.3390/fintech4020015 - 3 Apr 2025
Viewed by 8433
Abstract
This paper explores the current use of crypto-assets for payments, focusing mostly on unbacked crypto-assets, while selectively referring to stablecoins. Although some specific characteristics of crypto-assets, such as their price volatility and unclear legal settlement, render them unsuitable for payments, the rapid technological [...] Read more.
This paper explores the current use of crypto-assets for payments, focusing mostly on unbacked crypto-assets, while selectively referring to stablecoins. Although some specific characteristics of crypto-assets, such as their price volatility and unclear legal settlement, render them unsuitable for payments, the rapid technological and regulatory developments in the area of crypto-assets-based payments justify monitoring developments in this area. We therefore try to answer the research questions of which/why/how/where/by whom crypto-assets are used for (retail) payments. We analyse and describe a variety of ways in which crypto-assets are used for making payments, focusing on the period from 2019 to 2023 in Europe and worldwide, based on the publicly available statistical data and literature. We identify and exemplify the main use cases, payment methods, DeFi protocols, and payment gateways, and analyse payments with crypto-assets based on location and market participants. In addition, we describe and analyse the integration of crypto-assets into existing commercial payment services. Our work contributes to understanding the shifting domain of crypto-assets-based payments and provides insights into the monitoring of relevant developments via various dimensions that need to keep being explored, with the objective of contributing to the maintenance of the integrity and stability of the financial ecosystem. Full article
(This article belongs to the Special Issue Trends and New Developments in FinTech)
Show Figures

Figure 1

14 pages, 782 KB  
Article
Mathematical Proposal for Securing Split Learning Using Homomorphic Encryption and Zero-Knowledge Proofs
by Agon Kokaj and Elissa Mollakuqe
Appl. Sci. 2025, 15(6), 2913; https://doi.org/10.3390/app15062913 - 7 Mar 2025
Cited by 3 | Viewed by 2635
Abstract
This work presents a mathematical solution to data privacy and integrity issues in Split Learning which uses Homomorphic Encryption (HE) and Zero-Knowledge Proofs (ZKP). It allows calculations to be conducted on encrypted data, keeping the data private, while ZKP ensures the correctness of [...] Read more.
This work presents a mathematical solution to data privacy and integrity issues in Split Learning which uses Homomorphic Encryption (HE) and Zero-Knowledge Proofs (ZKP). It allows calculations to be conducted on encrypted data, keeping the data private, while ZKP ensures the correctness of these calculations without revealing the underlying data. Our proposed system, HavenSL, combines HE and ZKP to provide strong protection against attacks. It uses Discrete Cosine Transform (DCT) to analyze model updates in the frequency domain to detect unusual changes in parameters. HavenSL also has a rollback feature that brings the system back to a verified state if harmful changes are detected. Experiments on CIFAR-10, MNIST, and Fashion-MNIST datasets show that using Homomorphic Encryption and Zero-Knowledge Proofs during training is feasible and accuracy is maintained. This mathematical-based approach shows how crypto-graphic can protect decentralized learning systems. It also proves the practical use of HE and ZKP in secure, privacy-aware collaborative AI. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

16 pages, 1065 KB  
Review
Moonlighting Crypto-Enzymes and Domains as Ancient and Versatile Signaling Devices
by Ilona Turek, Aloysius Wong, Guido Domingo, Candida Vannini, Marcella Bracale, Helen Irving and Chris Gehring
Int. J. Mol. Sci. 2024, 25(17), 9535; https://doi.org/10.3390/ijms25179535 - 2 Sep 2024
Cited by 3 | Viewed by 1836
Abstract
Increasing numbers of reports have revealed novel catalytically active cryptic guanylate cyclases (GCs) and adenylate cyclases (ACs) operating within complex proteins in prokaryotes and eukaryotes. Here we review the structural and functional aspects of some of these cyclases and provide examples that illustrate [...] Read more.
Increasing numbers of reports have revealed novel catalytically active cryptic guanylate cyclases (GCs) and adenylate cyclases (ACs) operating within complex proteins in prokaryotes and eukaryotes. Here we review the structural and functional aspects of some of these cyclases and provide examples that illustrate their roles in the regulation of the intramolecular functions of complex proteins, such as the phytosulfokine receptor (PSKR), and reassess their contribution to signal generation and tuning. Another multidomain protein, Arabidopsis thaliana K+ uptake permease (AtKUP5), also harbors multiple catalytically active sites including an N-terminal AC and C-terminal phosphodiesterase (PDE) with an abscisic acid-binding site. We argue that this architecture may enable the fine-tuning and/or sensing of K+ flux and integrate hormone responses to cAMP homeostasis. We also discuss how searches with motifs based on conserved amino acids in catalytic centers led to the discovery of GCs and ACs and propose how this approach can be applied to discover hitherto masked active sites in bacterial, fungal, and animal proteomes. Finally, we show that motif searches are a promising approach to discover ancient biological functions such as hormone or gas binding. Full article
(This article belongs to the Special Issue Advances in Protein Dynamics)
Show Figures

Figure 1

21 pages, 4493 KB  
Article
Formal Language for Objects’ Transactions
by Mo Adda
Standards 2024, 4(3), 133-153; https://doi.org/10.3390/standards4030008 - 15 Aug 2024
Cited by 3 | Viewed by 1805
Abstract
The gap between software design and implementation often results in a lack of clarity and precision. Formal languages, based on mathematical rules, logic, and symbols, are invaluable for specifying and verifying system designs. Various semi-formal and formal languages, such as JSON, XML, predicate [...] Read more.
The gap between software design and implementation often results in a lack of clarity and precision. Formal languages, based on mathematical rules, logic, and symbols, are invaluable for specifying and verifying system designs. Various semi-formal and formal languages, such as JSON, XML, predicate logic, and regular expressions, along with formal models like Turing machines, serve specific domains. This paper introduces a new specification formal language, ObTFL (Object Transaction Formal Language), developed for general-purpose distributed systems, such as specifying the interactions between servers and IoT devices and their security protocols. The paper details the syntax and semantics of ObTFL and presents three real case studies—federated learning, blockchain for crypto and bitcoin networks, and the industrial PCB board with machine synchronization—to demonstrate its versatility and effectiveness in formally specifying the interactions and behaviors of distributed systems. Full article
Show Figures

Figure 1

13 pages, 646 KB  
Article
Deep-Learning-Based Neural Distinguisher for Format-Preserving Encryption Schemes FF1 and FF3
by Dukyoung Kim, Hyunji Kim, Kyungbae Jang, Seyoung Yoon and Hwajeong Seo
Electronics 2024, 13(7), 1196; https://doi.org/10.3390/electronics13071196 - 25 Mar 2024
Cited by 3 | Viewed by 2150
Abstract
Distinguishing data that satisfy the differential characteristic from random data is called a distinguisher attack. At CRYPTO’19, Gohr presented the first deep-learning-based distinguisher for round-reduced SPECK. Building upon Gohr’s work, various works have been conducted. Among many other works, we propose the first [...] Read more.
Distinguishing data that satisfy the differential characteristic from random data is called a distinguisher attack. At CRYPTO’19, Gohr presented the first deep-learning-based distinguisher for round-reduced SPECK. Building upon Gohr’s work, various works have been conducted. Among many other works, we propose the first neural distinguisher using single and multiple differences for format-preserving encryption (FPE) schemes FF1 and FF3. We harnessed the differential characteristics used in FF1 and FF3 classical distinguishers. They used SKINNY as the inner encryption algorithm for FF3. On the other hand, we employ the standard FF1 and FF3 implementations with AES encryption (which may be more robust). This work utilizes the differentials employed in FF1 and FF3 classical distinguishers. In short, when using a single 0x0F (resp. 0x08) differential, we achieve the highest accuracy of 0.85 (resp. 0.98) for FF1 (resp. FF3) in the 10-round (resp. 8-round) number domain. In the lowercase domain, due to an increased number of plaintext and ciphertext combinations, we can distinguish with the highest accuracy of 0.52 (resp. 0.55) for FF1 (resp. FF3) in a maximum of 2 rounds. Furthermore, we present an advanced neural distinguisher designed with multiple differentials for FF1 and FF3. With this sophisticated model, we still demonstrate valid accuracy in guessing the input difference used for encryption. Full article
(This article belongs to the Special Issue Novel Methods Applied to Security and Privacy Problems)
Show Figures

Figure 1

15 pages, 311 KB  
Article
Self-Bilinear Map from One Way Encoding System and i𝒪
by Huang Zhang, Ting Huang, Fangguo Zhang, Baodian Wei and Yusong Du
Information 2024, 15(1), 54; https://doi.org/10.3390/info15010054 - 17 Jan 2024
Cited by 2 | Viewed by 1889
Abstract
A bilinear map whose domain and target sets are identical is called a self-bilinear map. Original self-bilinear maps are defined over cyclic groups. Since the map itself reveals information about the underlying cyclic group, the Decisional Diffie–Hellman Problem (DDH) and the computational Diffie–Hellman [...] Read more.
A bilinear map whose domain and target sets are identical is called a self-bilinear map. Original self-bilinear maps are defined over cyclic groups. Since the map itself reveals information about the underlying cyclic group, the Decisional Diffie–Hellman Problem (DDH) and the computational Diffie–Hellman (CDH) problem may be solved easily in some specific groups. This brings a lot of limitations to constructing secure self-bilinear schemes. As a compromise, a self-bilinear map with auxiliary information was proposed in CRYPTO’2014. In this paper, we construct this weak variant of a self-bilinear map from generic sets and indistinguishable obfuscation. These sets should own several properties. A new notion, One Way Encoding System (OWES), is proposed to summarize these properties. The new Encoding Division Problem (EDP) is defined to complete the security proof. The OWES can be built by making use of one level of graded encoding systems (GES). To construct a concrete self-bilinear map scheme, Garg, Gentry, and Halvei(GGH13) GES is adopted in our work. Even though the security of GGH13 was recently broken by Hu et al., their algorithm does not threaten our applications. At the end of this paper, some further considerations for the EDP for concrete construction are given to improve the confidence that EDP is indeed hard. Full article
(This article belongs to the Section Information Security and Privacy)
19 pages, 1236 KB  
Article
A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture
by Jihye Lee, Whijin Kim and Ji-Hoon Kim
Sensors 2023, 23(23), 9408; https://doi.org/10.3390/s23239408 - 25 Nov 2023
Cited by 8 | Viewed by 4845
Abstract
The advancement of quantum computing threatens the security of conventional public-key cryptosystems. Post-quantum cryptography (PQC) was introduced to ensure data confidentiality in communication channels, and various algorithms are being developed. The National Institute of Standards and Technology (NIST) has initiated PQC standardization, and [...] Read more.
The advancement of quantum computing threatens the security of conventional public-key cryptosystems. Post-quantum cryptography (PQC) was introduced to ensure data confidentiality in communication channels, and various algorithms are being developed. The National Institute of Standards and Technology (NIST) has initiated PQC standardization, and the selected algorithms for standardization and round 4 candidates were announced in 2022. Due to the large memory footprint and highly repetitive operations, there have been numerous attempts to accelerate PQC on both hardware and software. This paper introduces the RISC-V instruction set extension for NIST PQC standard algorithms and round 4 candidates. The proposed programmable crypto-processor can support a wide range of PQC algorithms with the extended RISC-V instruction set and demonstrates significant reductions in code size, the number of executed instructions, and execution cycle counts of target operations in PQC algorithms of up to 79%, 92%, and 87%, respectively, compared to RV64IM with optimization level 3 (-O3) in the GNU toolchain. Full article
Show Figures

Figure 1

26 pages, 548 KB  
Article
Ransomware: Analysing the Impact on Windows Active Directory Domain Services
by Grant McDonald, Pavlos Papadopoulos, Nikolaos Pitropakis, Jawad Ahmad and William J. Buchanan
Sensors 2022, 22(3), 953; https://doi.org/10.3390/s22030953 - 26 Jan 2022
Cited by 19 | Viewed by 12921
Abstract
Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enterprises have become prime targets for ransomware as they are more likely to succumb to ransom demands [...] Read more.
Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enterprises have become prime targets for ransomware as they are more likely to succumb to ransom demands as part of operating expenses to counter the cost incurred from downtime. Despite the prevalence of ransomware as a threat towards organisations, there is very little information outlining how ransomware affects Windows Server environments, and particularly its proprietary domain services such as Active Directory. Hence, we aim to increase the cyber situational awareness of organisations and corporations that utilise these environments. Dynamic analysis was performed using three ransomware variants to uncover how crypto-ransomware affects Windows Server-specific services and processes. Our work outlines the practical investigation undertaken as WannaCry, TeslaCrypt, and Jigsaw were acquired and tested against several domain services. The findings showed that none of the three variants stopped the processes and decidedly left all domain services untouched. However, although the services remained operational, they became uniquely dysfunctional as ransomware encrypted the files pertaining to those services. Full article
(This article belongs to the Collection Cyber Situational Awareness in Computer Networks)
Show Figures

Figure 1

19 pages, 2015 KB  
Article
Electromagnetic and Power Side-Channel Analysis: Advanced Attacks and Low-Overhead Generic Countermeasures through White-Box Approach
by Debayan Das and Shreyas Sen
Cryptography 2020, 4(4), 30; https://doi.org/10.3390/cryptography4040030 - 31 Oct 2020
Cited by 23 | Viewed by 12403
Abstract
Electromagnetic and power side-channel analysis (SCA) provides attackers a prominent tool to extract the secret key from the cryptographic engine. In this article, we present our cross-device deep learning (DL)-based side-channel attack (X-DeepSCA) which reduces the time to attack on embedded [...] Read more.
Electromagnetic and power side-channel analysis (SCA) provides attackers a prominent tool to extract the secret key from the cryptographic engine. In this article, we present our cross-device deep learning (DL)-based side-channel attack (X-DeepSCA) which reduces the time to attack on embedded devices, thereby increasing the threat surface significantly. Consequently, with the knowledge of such advanced attacks, we performed a ground-up white-box analysis of the crypto IC to root-cause the source of the electromagnetic (EM) side-channel leakage. Equipped with the understanding that the higher-level metals significantly contribute to the EM leakage, we present STELLAR, which proposes to route the crypto core within the lower metals and then embed it within a current-domain signature attenuation (CDSA) hardware to ensure that the critical correlated signature gets suppressed before it reaches the top-level metal layers. CDSA-AES256 with local lower metal routing was fabricated in a TSMC 65 nm process and evaluated against different profiled and non-profiled attacks, showing protection beyond 1B encryptions, compared to ∼10K for the unprotected AES. Overall, the presented countermeasure achieved a 100× improvement over the state-of-the-art countermeasures available, with comparable power/area overheads and without any performance degradation. Moreover, it is a generic countermeasure and can be used to protect any crypto cores while preserving the legacy of the existing implementations. Full article
(This article belongs to the Special Issue Feature Papers in Hardware Security)
Show Figures

Figure 1

26 pages, 2019 KB  
Article
Cryptocurrencies Perception Using Wikipedia and Google Trends
by Piotr Stolarski, Włodzimierz Lewoniewski and Witold Abramowicz
Information 2020, 11(4), 234; https://doi.org/10.3390/info11040234 - 24 Apr 2020
Cited by 12 | Viewed by 15748
Abstract
In this research we presented different approaches to investigate the possible relationships between the largest crowd-based knowledge source and the market potential of particular cryptocurrencies. Identification of such relations is crucial because their existence may be used to create a broad spectrum of [...] Read more.
In this research we presented different approaches to investigate the possible relationships between the largest crowd-based knowledge source and the market potential of particular cryptocurrencies. Identification of such relations is crucial because their existence may be used to create a broad spectrum of analyses and reports about cryptocurrency projects and to obtain a comprehensive outlook of the blockchain domain. The activities on the blockchain reach different levels of anonymity which renders them hard objects of studies. In particular, the standard tools used to characterize social trends and variables that describe cryptocurrencies’ situations are unsuitable to be used in the environment that extensively employs cryptographic techniques to hide real users. The employment of Wikipedia to trace crypto assets value need examination because the portal allows gathering of different opinions—content of the articles is edited by a group of people. Consequently, the information can be more attractive and useful for the readers than in case of non-collaborative sources of information. Wikipedia Articles often appears in the premium position of such search engines as Google, Bing, Yahoo and others. One may expect different demand on information about particular cryptocurrency depending on the different events (e.g., sharp fluctuations of price). Wikipedia offers only information about cryptocurrencies that are important from the point of view of language community of the users in Wikipedia. This “filter” helps to better identify those cryptocurrencies that have a significant influence on the regional markets. The models encompass linkages between different variables and properties. In one model cryptocurrency projects are ranked with the means of articles sentiment and quality. In another model, Wikipedia visits are linked to cryptocurrencies’ popularity. Additionally, the interactions between information demand in different Wikipedia language versions are elaborated. They are used to assess the geographical esteem of certain crypto coins. The information about the legal status of cryptocurrency technologies in different states that are offered by Wikipedia is used in another proposed model. It allows assessment of the adoption of cryptocurrencies in a given legislature. Finally, a model is developed that joins Wikipedia articles editions and deletions with the social sentiment towards particular cryptocurrency projects. The mentioned analytical purposes that permit assessment of the popularity of blockchain technologies in different local communities are not the only results of the paper. The models can show which country has the biggest demand on particular cryptocurrencies, such as Bitcoin, Ethereum, Ripple, Bitcoin Cash, Monero, Litecoin, Dogecoin and others. Full article
(This article belongs to the Special Issue Blockchain and Smart Contract Technologies)
Show Figures

Figure 1

Back to TopTop