This paper evaluates the cybersecurity risks posed by the widespread use of Elliptic Curve Digital Signature Algorithm (ECDSA) cryptography in major blockchains like Bitcoin, Ethereum, and Hyperledger against the threat of quantum computing. ECDSA is vulnerable to being broken by quantum computers. The paper proposes adopting lattice-based cryptography, one of the post-quantum cryptography candidates being standardized by NIST, as it can be implemented in the near term to provide protection against quantum attacks. Adopting a coordinated industry-wide approach to lattice-based public keys is suggested before quantum computers capable of breaking current cryptography become a reality. The rapid advancement of quantum computing research makes the risks difficult to predict, so transitioning blockchains to post
Building Quantum REsistant Blockchains. The Journal of The British Blockchain...eraser Juan José Calderón
Building Quantum REsistant Blockchains. The Journal of The British Blockchain Association
Full Text PDF of The JBBA, Volume 2 Issue 2, October 2019
The British Blockchain Association
issn: 2516-3957
A blockchain is a growing list of records called blocks, which are linked using cryptography. This paper introduces typical blockchain consensus algorithms, reviews blockchain applications and discusses technical challenges as well as recent advances in tackling the challenges. Moreover, this paper also points out the future directions in the blockchain technology. Sukesha Subhash Patil | Prof Y. L. Puranik ""Blockchain Technology"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23774.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/23774/blockchain-technology/sukesha-subhash-patil
Buzz factor or innovation potential - cryptocurrencies’ comparedIan Beckett
This document summarizes a research article that examines factors associated with variations in cryptocurrency market values. It finds that a cryptocurrency's innovation potential, as measured by technological upgrades, is the most important positive factor associated with returns. In contrast, "buzz" or media attention surrounding cryptocurrencies is negatively associated with returns after controlling for other factors. Unexpected increases in supply are also positively associated with returns, which challenges traditional economic theories. The study analyzes weekly return data for five major cryptocurrencies over one year to identify supply and demand drivers of cryptocurrency price fluctuations.
IFLA ARL Hot Topics 2020: Libraries as Catalysts - Inspire, Engage, Enable, C...IFLAAcademicandResea
Libraries in China have seen a rapid growth in Intellectual Property Information Service (IPIS) centers over the past few years, with over 100 established. These centers were encouraged by the Chinese government to support innovation and patent applications. They provide services like patent searches, analysis of patent trends, and support for industries. While still developing, they represent a promising new direction for academic research libraries in China. Compared to the US, where similar centers have existed longer in libraries but not transformed them, the growth of IPIS centers could impact the transformation of Chinese academic libraries.
Macro Review of Cryptoassets Landscape - July 2018 by David GogelDavid Gogel
The document provides a macro review and overview of the cryptoassets market landscape and future of financing through digital asset innovation. It discusses key trends like the transition from retail to institutional investors; the growth of cryptonetworks powered by blockchain technology; and emerging investment opportunities in areas like security tokens, custodian solutions, and stablecoins. Regulatory uncertainty remains a challenge but guidance is emerging while self-regulation is also needed. The crypto market cap grew significantly in 2017 before stabilizing at a lower level, and fundraising models are evolving from ICOs to private rounds as the space matures.
Zeffirelli's 1968 film adaptation of Romeo and Juliet was a critical and commercial success, winning multiple awards including Academy Awards for Best Cinematography and Best Costume Design. The film starred Leonard Whiting and Olivia Hussey as the young lovers Romeo and Juliet. Through beautiful cinematography and costumes, Zeffirelli brought Shakespeare's classic tragedy to life in a way that was praised for its faithfulness to the original text while still appealing to modern audiences.
Presentation on how blockchain tech can positively impact the scientific process - from Idea/Hypothesis, through Seeking Funding, to Run and Analyse Experiment, to Publish and Share.. Summarises work done under the auspices of IUPAC to be published as a white paper in 1H 2023.
Research Publications of Electronics and Communication Engineering.pdfkrctseo
In the fast-paced world of Electronics and Communication Engineering (ECE), staying abreast of the latest developments and breakthroughs is essential. From advancements in wireless communication to novel materials for electronic applications; researchers in this field are constantly pushing the boundaries of what's possible. Here, in this blog post, we will explore into some January to March 2023 Research publications from ECE department at KRCT. Further, this highlights the diverse and innovative research being conducted in ECE.
Building Quantum REsistant Blockchains. The Journal of The British Blockchain...eraser Juan José Calderón
Building Quantum REsistant Blockchains. The Journal of The British Blockchain Association
Full Text PDF of The JBBA, Volume 2 Issue 2, October 2019
The British Blockchain Association
issn: 2516-3957
A blockchain is a growing list of records called blocks, which are linked using cryptography. This paper introduces typical blockchain consensus algorithms, reviews blockchain applications and discusses technical challenges as well as recent advances in tackling the challenges. Moreover, this paper also points out the future directions in the blockchain technology. Sukesha Subhash Patil | Prof Y. L. Puranik ""Blockchain Technology"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23774.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/23774/blockchain-technology/sukesha-subhash-patil
Buzz factor or innovation potential - cryptocurrencies’ comparedIan Beckett
This document summarizes a research article that examines factors associated with variations in cryptocurrency market values. It finds that a cryptocurrency's innovation potential, as measured by technological upgrades, is the most important positive factor associated with returns. In contrast, "buzz" or media attention surrounding cryptocurrencies is negatively associated with returns after controlling for other factors. Unexpected increases in supply are also positively associated with returns, which challenges traditional economic theories. The study analyzes weekly return data for five major cryptocurrencies over one year to identify supply and demand drivers of cryptocurrency price fluctuations.
IFLA ARL Hot Topics 2020: Libraries as Catalysts - Inspire, Engage, Enable, C...IFLAAcademicandResea
Libraries in China have seen a rapid growth in Intellectual Property Information Service (IPIS) centers over the past few years, with over 100 established. These centers were encouraged by the Chinese government to support innovation and patent applications. They provide services like patent searches, analysis of patent trends, and support for industries. While still developing, they represent a promising new direction for academic research libraries in China. Compared to the US, where similar centers have existed longer in libraries but not transformed them, the growth of IPIS centers could impact the transformation of Chinese academic libraries.
Macro Review of Cryptoassets Landscape - July 2018 by David GogelDavid Gogel
The document provides a macro review and overview of the cryptoassets market landscape and future of financing through digital asset innovation. It discusses key trends like the transition from retail to institutional investors; the growth of cryptonetworks powered by blockchain technology; and emerging investment opportunities in areas like security tokens, custodian solutions, and stablecoins. Regulatory uncertainty remains a challenge but guidance is emerging while self-regulation is also needed. The crypto market cap grew significantly in 2017 before stabilizing at a lower level, and fundraising models are evolving from ICOs to private rounds as the space matures.
Zeffirelli's 1968 film adaptation of Romeo and Juliet was a critical and commercial success, winning multiple awards including Academy Awards for Best Cinematography and Best Costume Design. The film starred Leonard Whiting and Olivia Hussey as the young lovers Romeo and Juliet. Through beautiful cinematography and costumes, Zeffirelli brought Shakespeare's classic tragedy to life in a way that was praised for its faithfulness to the original text while still appealing to modern audiences.
Presentation on how blockchain tech can positively impact the scientific process - from Idea/Hypothesis, through Seeking Funding, to Run and Analyse Experiment, to Publish and Share.. Summarises work done under the auspices of IUPAC to be published as a white paper in 1H 2023.
Research Publications of Electronics and Communication Engineering.pdfkrctseo
In the fast-paced world of Electronics and Communication Engineering (ECE), staying abreast of the latest developments and breakthroughs is essential. From advancements in wireless communication to novel materials for electronic applications; researchers in this field are constantly pushing the boundaries of what's possible. Here, in this blog post, we will explore into some January to March 2023 Research publications from ECE department at KRCT. Further, this highlights the diverse and innovative research being conducted in ECE.
The Rise and Fall of Cryptocurrencies: Defining the Economic and Social Value...Petar Radanliev
The study examines blockchain technologies and their pivotal role in the evolving Metaverse, shedding light on topics such as how to invest in cryptocurrency, the mechanics behind crypto mining, and strategies to effectively buy and trade cryptocurrencies. Through an interdisciplinary approach, the research transitions from the fundamental principles of fintech investment strategies to the overarching implications of blockchain within the Metaverse. Alongside exploring machine learning potentials in financial sectors and risk assessment methodologies, the study critically assesses whether developed or developing nations are poised to reap greater benefits from these technologies. Moreover, it probes into both enduring and dubious crypto projects, drawing a distinct line between genuine blockchain applications and Ponzi-like schemes. The conclusion resolutely affirms the continuing dominance of blockchain technologies, underlined by a profound exploration of their intrinsic value and a reflective commentary by the author on the potential risks confCybersecurity Risks ronting individual investors.
Hear, Explore and learn the latest research. Present before distinguished global audience. Collaborate, build partnerships and experience Toronto, Canada. Join the global academic community.
Ology Mavens invites all the participants across the globe to attend the “International Conference on Cell and Structural Biology’’ during July 15-16, 2019 in Toronto, Canada.
Structural Biology 2019 aims to bring together leading academic scientists, researchers, research scholars and entrepreneurs to exchange and share their experiences and research results on all aspects of Structural Molecular Biology and Cell Biology. Structural Biology 2019 delivers a premier interdisciplinary platform for scientists, researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered, and solutions adopted in the fields of Structural and Molecular Biology.
In addition to the multidisciplinary talks, Keynote sessions, Poster Presentation and Workshops relevant to Structural and Molecular Biology, the Structural Biology 2019 is a complete 2-day scientific event, business meet, trade fair and exhibition with panel discussions, open Q & A to generate a prime learning knowledge between participants in the alluring city of Toronto, Canada.
We invite all attendees to contribute throughout the sessions to make the event a memorable from the point of view of learning and Networking.
2nd International Conference on Biotechnology, Bio Informatics, Bio Medical S...Global R & D Services
Conference Name: 2nd International Conference on Biotechnology, Bio Informatics, Bio Medical Sciences and Stem Cell Applications (B3SC), 27-28 May 2016, Kuala Lumpur
Conference Dates: May 27-28, 2016
Conference Venue: Rumah Kelab PAUM Clubhouse (Persatuan Alumni Universiti Malaya), Kuala Lumpur, Malaysia
Deadline for Abstract/Paper Submissions: May 24, 2016
Contact E-Mail ID: info@wasrti.org
Conference Convener: Dr Vivian L
Languages: English, Chinese, Arabic, Thai, Persian
This document discusses KBART, a NISO recommended practice for exchanging accurate journal holdings data between publishers, aggregators, and knowledge base providers. KBART aims to standardize this data exchange to ensure better access to content through link resolvers and other tools. It establishes a universally acceptable format for title level coverage data that specifies dates and volumes/issues. Adopting KBART will help address common problems with holdings lists and allow automated updating between systems. The document urges publishers, libraries and others in the scholarly content supply chain to participate in KBART and register their holdings data in the KBART Registry.
ICA offers you complete info about recent & upcoming international conferences, events, seminars, webinars and workshops in Kyoto in 2020/2021. We provide conference alerts for popular conferences/events/seminars/webinars happening in your city. With over 100,000 registered conference/event subscribers, we show you conference listings across 150+ academic field of studies in more than 170 countries worldwide.
11th International Conference on Biotechnology, Bio Informatics, Bio Medical ...Global R & D Services
Conference Name: 11th International Conference on Biotechnology, Bio Informatics, Bio Medical Sciences and Stem Cell Applications (B3SC), 21-22 Sept, 2016, London
Conference Dates: 21-22 Sept, 2016
Conference Venue: Imperial College London, South Kensington Campus | London SW7 2AZ
Deadline for Abstract/Paper Submissions: Sept 18, 2016
Contact E-Mail ID: info@iaphlsr.org
Conference Convener: Dr. Pallavi R
Languages: English, Chinese, Arabic, Thai, Persian
http://iaphlsr.org/11th-international-conference-on-biotechnology-bio-informatics-bio-medical-sciences-and-stem-cell-applications-b3sc-21-22-sept-2016-london-about-27
The document summarizes the Centre for Business Innovation (CfBI) Microfluidics Consortium. Key points:
- The consortium brings together members from across the microfluidics value chain to accelerate learning, reduce costs, and influence stakeholders to grow the microfluidics market.
- Members meet privately six times per year to identify opportunities and engage with industry leaders, and publicly twice a year to promote members.
- Recent successes include establishing standards and design guidelines, an online knowledge hub, and numerous member agreements and partnerships.
- Upcoming activities include expanding into new application areas, furthering standards work, and intensifying engagement with regulators to support members' solutions.
The document summarizes discussions from a meeting about ensuring long-term access to scholarly works in electronic formats. It describes the governance and activities of the UK LOCKSS Alliance, including comparison of different e-journal archiving initiatives, the PECAN project to build an entitlement registry, and recommendations from a white paper on e-journal archiving. It also discusses the newly formed JARVIG committee tasked with determining the most effective national e-journal archiving infrastructure for UK higher education.
Understanding Islamic Banking And Its Prospect In United KingdomSohail Mohammad
Islamic banking is a subject which many people, including Muslims, know very little about. The theory of interest-free banking itself is a revolutionary idea in the banking business of a country, but this aspect often gives rise to confusion and misconceptions about the operation of Islamic banking. The growth of Islamic banking partly reflects demand from Muslims clients for Islamic deposit facilities and fund management services which involve shariah compliance. At the same time, Islamic banking methods are viewed as a challenge and opportunity by conventional bankers, many of whom have sought to get involved in this growing industry. In client driven societies there is a willingness by those in financial services to learn from the experiences of Islamic banks. Further, the globalization of trade necessitates the conducting of affairs of Islamic bank with non-Islamic banks, and vice-versa. Such integrated international trade demands that business communities, banks and other trade regulatory bodies of both Muslim and non-Muslim countries should gain some understanding of the principles of Islamic banking. So the knowledge of current Islamic banking as compared to the conventional banking is very significant for economists, bankers, administrators and other peoples involved with international trade and commerce. Added to these, the increasing number Islamic banks in various countries made it a necessity for banking communities to have some insight into the workings of Islamic banks.
Therefore, the present comparative research will familiarize the readers with the principles of shariah and will provide an insight into the rules and principles of Islamic banking as well. In spite of the fact, that the Islamic banks are operating successfully alongside other conventional banks and playing an increasing role in the economy, there has been little comprehension research on Islamic banking in United Kingdom.
Panel Discussion on Open Access - John Fitzgerald (UCC)CONUL Conference
This document discusses the high costs of journal subscriptions and open access initiatives to make scholarly information more accessible. It notes that university libraries collectively pay over $1 billion annually in subscription fees to publishers. While open access is making progress through infrastructure, policies and business models, it may not be enough to significantly disrupt the existing system. The document suggests that reforming peer review and assessment processes could be a tactic to consider in addition to promoting open access models and negotiating with publishers as a consortium.
This document provides information about sponsors and organizers of the IUBMB-FEBS Congress taking place from September 4-9, 2012 in Seville, Spain. It lists different levels of institutional sponsors, including VIP Sponsors, Privileged Sponsors, Strategic Sponsors, General Sponsors, SEBBM Long Term Sponsors, and Exhibitors. It also lists the organizing societies and provides the website and contact information for the congress. The document appears to be providing attendees of the congress with information about sponsorship opportunities and organizations involved in organizing the event.
This document provides an executive summary and analysis of positioning British Columbia as a global FinTech hub. It finds that Vancouver is well positioned due to its location, business environment, growing talent pool, and regulatory structure. The document recommends that BC support the growth of FinTech startups, develop partnerships with other hubs, and promote Vancouver's strengths to establish it as a leader in this emerging industry. Blockchain and other financial technologies represent a significant opportunity for BC to attract investment and jobs if the right supports are put in place.
BAIConf Blockchain Alternative Investment Conference London 2018 programme bo...C Hong
Cumberland is one of the largest liquidity providers in cryptoassets globally. Since 2014, their experienced team has provided two-sided markets and liquidity to minimize market impact for institutional investors. They have offices in Chicago, London, and Singapore. The event welcomes speakers and attendees to discuss institutional investment in cryptocurrencies and blockchain applications. Cumberland is a sponsor of the conference.
The Biomed Grid aims to publish scientific research papers on biomedical technology to advance healthcare. It focuses on how technology assists in medical scenarios and clinical research. The journal shares quality content with researchers, students, and professionals to further biomedical knowledge. It accepts articles, reviews, case studies, and other formats to disseminate insights broadly. The journal has a peer review process and makes research openly accessible online to benefit society.
Gorman ODNI Academic Excellence Biosecurity Commons August 2, 2010bgorman
The Biosecurity Commons project engages students in national security policy issues through activities like data mining, information sharing, and critical analysis. Students and faculty collaborate on this "web-tank" concept, merging traditional research and writing with new web-based and social media approaches. The guiding philosophy relies on a genuine faculty-student partnership where students conduct research, write briefs, and have their work publicly posted and attributed online. This provides immediate recognition of students' contributions while building an online database of security-related information and analysis.
Describes general insurance vs commercial insurance and the findings of Blockchain/Distributed Ledger Technology Proof of Concepts run in the London Commercial Insurance Market
Essay On Energy Crisis In Pakistan 2014. Online assignment writing service.Allison Gilbert
The document outlines 5 steps for seeking writing help from HelpWriting.net:
1. Create an account and provide login credentials.
2. Complete a 10-minute order form providing instructions, sources, and deadline.
3. Review bids from writers and choose one based on qualifications.
4. Review the completed paper and authorize payment if satisfied.
5. Request revisions to ensure satisfaction, with a refund offered for plagiarized work.
Evaluación de t-MOOC universitario sobre competencias digitales docentes medi...eraser Juan José Calderón
Evaluación de t-MOOC universitario sobre competencias
digitales docentes mediante juicio de expertos
según el Marco DigCompEdu.
Julio Cabero-Almenara
Universidad de Sevilla, Sevilla, España
cabero@us.es
Julio Barroso--‐Osuna
Universidad de Sevilla, Sevilla, España
jbarroso@us.es
Antonio Palacios--‐Rodríguez
Universidad de Sevilla, Sevilla, España
aprodriguez@us.es
Carmen Llorente--‐Cejudo
Universidad de Sevilla, Sevilla, España
karen@us.es
This document announces a special issue of the journal "Comunicar" on hate speech in communication. It provides details such as the issue date, submission deadline, thematic editors, and scope. The scope describes hate speech and calls for research analyzing hate speech messages, backgrounds, and intervention strategies. The document lists descriptive keywords and questions to guide submitted papers. It introduces the three thematic editors and provides their backgrounds and research interests related to communication, media, and online environments. Submission guidelines and relevant website links are also included.
More Related Content
Similar to The Journal of The British Blockchain Association The JBBA Vol 2, Issue 1, May 2019
The Rise and Fall of Cryptocurrencies: Defining the Economic and Social Value...Petar Radanliev
The study examines blockchain technologies and their pivotal role in the evolving Metaverse, shedding light on topics such as how to invest in cryptocurrency, the mechanics behind crypto mining, and strategies to effectively buy and trade cryptocurrencies. Through an interdisciplinary approach, the research transitions from the fundamental principles of fintech investment strategies to the overarching implications of blockchain within the Metaverse. Alongside exploring machine learning potentials in financial sectors and risk assessment methodologies, the study critically assesses whether developed or developing nations are poised to reap greater benefits from these technologies. Moreover, it probes into both enduring and dubious crypto projects, drawing a distinct line between genuine blockchain applications and Ponzi-like schemes. The conclusion resolutely affirms the continuing dominance of blockchain technologies, underlined by a profound exploration of their intrinsic value and a reflective commentary by the author on the potential risks confCybersecurity Risks ronting individual investors.
Hear, Explore and learn the latest research. Present before distinguished global audience. Collaborate, build partnerships and experience Toronto, Canada. Join the global academic community.
Ology Mavens invites all the participants across the globe to attend the “International Conference on Cell and Structural Biology’’ during July 15-16, 2019 in Toronto, Canada.
Structural Biology 2019 aims to bring together leading academic scientists, researchers, research scholars and entrepreneurs to exchange and share their experiences and research results on all aspects of Structural Molecular Biology and Cell Biology. Structural Biology 2019 delivers a premier interdisciplinary platform for scientists, researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered, and solutions adopted in the fields of Structural and Molecular Biology.
In addition to the multidisciplinary talks, Keynote sessions, Poster Presentation and Workshops relevant to Structural and Molecular Biology, the Structural Biology 2019 is a complete 2-day scientific event, business meet, trade fair and exhibition with panel discussions, open Q & A to generate a prime learning knowledge between participants in the alluring city of Toronto, Canada.
We invite all attendees to contribute throughout the sessions to make the event a memorable from the point of view of learning and Networking.
2nd International Conference on Biotechnology, Bio Informatics, Bio Medical S...Global R & D Services
Conference Name: 2nd International Conference on Biotechnology, Bio Informatics, Bio Medical Sciences and Stem Cell Applications (B3SC), 27-28 May 2016, Kuala Lumpur
Conference Dates: May 27-28, 2016
Conference Venue: Rumah Kelab PAUM Clubhouse (Persatuan Alumni Universiti Malaya), Kuala Lumpur, Malaysia
Deadline for Abstract/Paper Submissions: May 24, 2016
Contact E-Mail ID: info@wasrti.org
Conference Convener: Dr Vivian L
Languages: English, Chinese, Arabic, Thai, Persian
This document discusses KBART, a NISO recommended practice for exchanging accurate journal holdings data between publishers, aggregators, and knowledge base providers. KBART aims to standardize this data exchange to ensure better access to content through link resolvers and other tools. It establishes a universally acceptable format for title level coverage data that specifies dates and volumes/issues. Adopting KBART will help address common problems with holdings lists and allow automated updating between systems. The document urges publishers, libraries and others in the scholarly content supply chain to participate in KBART and register their holdings data in the KBART Registry.
ICA offers you complete info about recent & upcoming international conferences, events, seminars, webinars and workshops in Kyoto in 2020/2021. We provide conference alerts for popular conferences/events/seminars/webinars happening in your city. With over 100,000 registered conference/event subscribers, we show you conference listings across 150+ academic field of studies in more than 170 countries worldwide.
11th International Conference on Biotechnology, Bio Informatics, Bio Medical ...Global R & D Services
Conference Name: 11th International Conference on Biotechnology, Bio Informatics, Bio Medical Sciences and Stem Cell Applications (B3SC), 21-22 Sept, 2016, London
Conference Dates: 21-22 Sept, 2016
Conference Venue: Imperial College London, South Kensington Campus | London SW7 2AZ
Deadline for Abstract/Paper Submissions: Sept 18, 2016
Contact E-Mail ID: info@iaphlsr.org
Conference Convener: Dr. Pallavi R
Languages: English, Chinese, Arabic, Thai, Persian
http://iaphlsr.org/11th-international-conference-on-biotechnology-bio-informatics-bio-medical-sciences-and-stem-cell-applications-b3sc-21-22-sept-2016-london-about-27
The document summarizes the Centre for Business Innovation (CfBI) Microfluidics Consortium. Key points:
- The consortium brings together members from across the microfluidics value chain to accelerate learning, reduce costs, and influence stakeholders to grow the microfluidics market.
- Members meet privately six times per year to identify opportunities and engage with industry leaders, and publicly twice a year to promote members.
- Recent successes include establishing standards and design guidelines, an online knowledge hub, and numerous member agreements and partnerships.
- Upcoming activities include expanding into new application areas, furthering standards work, and intensifying engagement with regulators to support members' solutions.
The document summarizes discussions from a meeting about ensuring long-term access to scholarly works in electronic formats. It describes the governance and activities of the UK LOCKSS Alliance, including comparison of different e-journal archiving initiatives, the PECAN project to build an entitlement registry, and recommendations from a white paper on e-journal archiving. It also discusses the newly formed JARVIG committee tasked with determining the most effective national e-journal archiving infrastructure for UK higher education.
Understanding Islamic Banking And Its Prospect In United KingdomSohail Mohammad
Islamic banking is a subject which many people, including Muslims, know very little about. The theory of interest-free banking itself is a revolutionary idea in the banking business of a country, but this aspect often gives rise to confusion and misconceptions about the operation of Islamic banking. The growth of Islamic banking partly reflects demand from Muslims clients for Islamic deposit facilities and fund management services which involve shariah compliance. At the same time, Islamic banking methods are viewed as a challenge and opportunity by conventional bankers, many of whom have sought to get involved in this growing industry. In client driven societies there is a willingness by those in financial services to learn from the experiences of Islamic banks. Further, the globalization of trade necessitates the conducting of affairs of Islamic bank with non-Islamic banks, and vice-versa. Such integrated international trade demands that business communities, banks and other trade regulatory bodies of both Muslim and non-Muslim countries should gain some understanding of the principles of Islamic banking. So the knowledge of current Islamic banking as compared to the conventional banking is very significant for economists, bankers, administrators and other peoples involved with international trade and commerce. Added to these, the increasing number Islamic banks in various countries made it a necessity for banking communities to have some insight into the workings of Islamic banks.
Therefore, the present comparative research will familiarize the readers with the principles of shariah and will provide an insight into the rules and principles of Islamic banking as well. In spite of the fact, that the Islamic banks are operating successfully alongside other conventional banks and playing an increasing role in the economy, there has been little comprehension research on Islamic banking in United Kingdom.
Panel Discussion on Open Access - John Fitzgerald (UCC)CONUL Conference
This document discusses the high costs of journal subscriptions and open access initiatives to make scholarly information more accessible. It notes that university libraries collectively pay over $1 billion annually in subscription fees to publishers. While open access is making progress through infrastructure, policies and business models, it may not be enough to significantly disrupt the existing system. The document suggests that reforming peer review and assessment processes could be a tactic to consider in addition to promoting open access models and negotiating with publishers as a consortium.
This document provides information about sponsors and organizers of the IUBMB-FEBS Congress taking place from September 4-9, 2012 in Seville, Spain. It lists different levels of institutional sponsors, including VIP Sponsors, Privileged Sponsors, Strategic Sponsors, General Sponsors, SEBBM Long Term Sponsors, and Exhibitors. It also lists the organizing societies and provides the website and contact information for the congress. The document appears to be providing attendees of the congress with information about sponsorship opportunities and organizations involved in organizing the event.
This document provides an executive summary and analysis of positioning British Columbia as a global FinTech hub. It finds that Vancouver is well positioned due to its location, business environment, growing talent pool, and regulatory structure. The document recommends that BC support the growth of FinTech startups, develop partnerships with other hubs, and promote Vancouver's strengths to establish it as a leader in this emerging industry. Blockchain and other financial technologies represent a significant opportunity for BC to attract investment and jobs if the right supports are put in place.
BAIConf Blockchain Alternative Investment Conference London 2018 programme bo...C Hong
Cumberland is one of the largest liquidity providers in cryptoassets globally. Since 2014, their experienced team has provided two-sided markets and liquidity to minimize market impact for institutional investors. They have offices in Chicago, London, and Singapore. The event welcomes speakers and attendees to discuss institutional investment in cryptocurrencies and blockchain applications. Cumberland is a sponsor of the conference.
The Biomed Grid aims to publish scientific research papers on biomedical technology to advance healthcare. It focuses on how technology assists in medical scenarios and clinical research. The journal shares quality content with researchers, students, and professionals to further biomedical knowledge. It accepts articles, reviews, case studies, and other formats to disseminate insights broadly. The journal has a peer review process and makes research openly accessible online to benefit society.
Gorman ODNI Academic Excellence Biosecurity Commons August 2, 2010bgorman
The Biosecurity Commons project engages students in national security policy issues through activities like data mining, information sharing, and critical analysis. Students and faculty collaborate on this "web-tank" concept, merging traditional research and writing with new web-based and social media approaches. The guiding philosophy relies on a genuine faculty-student partnership where students conduct research, write briefs, and have their work publicly posted and attributed online. This provides immediate recognition of students' contributions while building an online database of security-related information and analysis.
Describes general insurance vs commercial insurance and the findings of Blockchain/Distributed Ledger Technology Proof of Concepts run in the London Commercial Insurance Market
Essay On Energy Crisis In Pakistan 2014. Online assignment writing service.Allison Gilbert
The document outlines 5 steps for seeking writing help from HelpWriting.net:
1. Create an account and provide login credentials.
2. Complete a 10-minute order form providing instructions, sources, and deadline.
3. Review bids from writers and choose one based on qualifications.
4. Review the completed paper and authorize payment if satisfied.
5. Request revisions to ensure satisfaction, with a refund offered for plagiarized work.
Similar to The Journal of The British Blockchain Association The JBBA Vol 2, Issue 1, May 2019 (20)
Evaluación de t-MOOC universitario sobre competencias digitales docentes medi...eraser Juan José Calderón
Evaluación de t-MOOC universitario sobre competencias
digitales docentes mediante juicio de expertos
según el Marco DigCompEdu.
Julio Cabero-Almenara
Universidad de Sevilla, Sevilla, España
cabero@us.es
Julio Barroso--‐Osuna
Universidad de Sevilla, Sevilla, España
jbarroso@us.es
Antonio Palacios--‐Rodríguez
Universidad de Sevilla, Sevilla, España
aprodriguez@us.es
Carmen Llorente--‐Cejudo
Universidad de Sevilla, Sevilla, España
karen@us.es
This document announces a special issue of the journal "Comunicar" on hate speech in communication. It provides details such as the issue date, submission deadline, thematic editors, and scope. The scope describes hate speech and calls for research analyzing hate speech messages, backgrounds, and intervention strategies. The document lists descriptive keywords and questions to guide submitted papers. It introduces the three thematic editors and provides their backgrounds and research interests related to communication, media, and online environments. Submission guidelines and relevant website links are also included.
REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL LAYING DOWN HARMONIS...eraser Juan José Calderón
Proposal for a
REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
LAYING DOWN HARMONISED RULES ON ARTIFICIAL INTELLIGENCE
(ARTIFICIAL INTELLIGENCE ACT) AND AMENDING CERTAIN UNION
LEGISLATIVE ACTS
Predicting Big Data Adoption in Companies With an Explanatory and Predictive ...eraser Juan José Calderón
Predicting Big Data Adoption in Companies With an Explanatory and Predictive Model
Predecir la adopción de Big Data en empresas con un modelo explicativo y predictivo. @currovillarejo @jpcabrera71 @gutiker y @fliebc
Innovar con blockchain en las ciudades: Ideas para lograrlo, casos de uso y a...eraser Juan José Calderón
La jornada analizó casos reales de uso de blockchain y sus posibilidades en Las Rozas a través de varias mesas redondas. Se presentó el proyecto DeConfianza que usa blockchain para dar transparencia a la compra de viviendas. También se discutió el potencial de la identidad digital soberana basada en blockchain y algunas aplicaciones posibles en Las Rozas como la gestión energética. Las Rozas fue elogiado como un espacio para probar innovaciones como blockchain.
Ética y Revolución Digital
Revista Diecisiete nº 4 2021. Investigación Interdisciplinar para los Objetivos de Desarrollo Sostenible.
PANORAMA
Ética y Derecho en la Revolución Digital
Txetxu Ausín y Margarita Robles Carrillo
artículoS
¿Cuarta Revolución Industrial? El reto de la digitalización y sus consecuencias ambientales y antropológicas
Joaquín Fernández Mateo
Hacia una ética del ecosistema híbrido del espacio físico y el ciberespacio
Ángel Gómez de Ágreda y Claudio Feijóo
Aprendizaje-Servicio y Agenda 2030 en la formación de ingenieros de la tecnología inteligente
Angeles Manjarrés y Simon Pickin
Tecnología Humanitaria como catalizadora de una nueva arquitectura de Acción Exterior en España: Horizonte 2030
Raquel Esther Jorge Ricart
Revolución digital, tecnooptimismo y educación
Ricardo Riaza
Desafíos éticos en la aplicación de la inteligencia artificial a los sistemas de defensa
Juan A. Moliner González
notas y colaboraciones
Hacerse viral: las actividades artísticas y su respuesta ante los retos que impone la transformación digital
Marta Pérez Ibáñez
Salud digital: una oportunidad y un imperativo ético
Joan Bigorra Llosas y Laura Sampietro-Colom
El futuro digital del sector energético
Beatriz Crisóstomo Merino y María Luz Cruz Aparicio
Innovación y transformación digital en las ONG. La visión de Acción contra el Hambre
Víctor Giménez Sánchez de la Blanca
El impacto de la inteligencia artificial en la Sociedad y su aplicación en el sector financiero
María Asunción Gilsanz Muñoz
La ética en los estudios de ingeniería
Rafael Miñano Rubio y Gonzalo Génova Fuster
An ethical and sustainable future of work
David Pastor-Escuredo, Gianni Giacomelli, Julio Lumbreras y Juan Garbajosa
Los datos en una administración pública digital - Perspectiva Uruguay
María Laura Rodríguez Mendaro
Ciudades y digitalización: construyendo desde la ética
David Pastor-Escuredo, Celia Fernandez-Aller, Jesus Salgado, Leticia Izquierdo y María Ángeles Huerta
#StopBigTechGoverningBigTech . More than 170 Civil Society Groups Worldwide O...eraser Juan José Calderón
#StopBigTechGoverningBigTech: More than 170 Civil Society Groups Worldwide Oppose Plans for a
Big Tech Dominated Body for Global Digital Governance.
Not only in developing countries but also in the US and EU, calls for stronger regulation of Big Tech
are rising. At the precise point when we should be shaping global norms to regulate Big Tech, plans
have emerged for an ‘empowered’ global digital governance body that will evidently be dominated
by Big Tech. Adding vastly to its already overweening power, this new Body would help Big Tech
resist effective regulation, globally and at national levels. Indeed, we face the unbelievable prospect
of ‘a Big Tech led body for Global Governance of Big Tech’.
Este documento presenta un pacto por la ciencia y la innovación en España. Propone aumentar la inversión pública en I+D+I gradualmente hasta alcanzar el 1.25% del PIB en 2030 para alcanzar los niveles de inversión de la UE. También compromete dotar de autonomía a las entidades financiadoras de I+D+I y consolidar una carrera pública estable para los investigadores.
The document announces the expert panel members of the European Blockchain Observatory and Forum. It lists over 100 experts from academia and industry across Europe who will advise on strengthening the European blockchain ecosystem. The experts come from a variety of backgrounds including law, technology, finance, government, and consulting.
Desigualdades educativas derivadas del COVID-19 desde una perspectiva feminis...eraser Juan José Calderón
Desigualdades educativas derivadas del COVID-19 desde una perspectiva feminista. Análisis de los discursos de profesionales de la educación madrileña.
Melani Penna Tosso * Mercedes Sánchez SáinzCristina Mateos CasadoUniversidad Complutense de Madrid, España
Objetivos: Especificar las principales dificultades percibidas por las profesoras y los departamentos y equipos de orientación en relación con la atención a las diversidades en la actual situación de pandemia generada por el COVID-19. Exponer las prácticas educativas implementadas por dichas profesionales para disminuir las desigualdades. Visibilizar desigualdades de género que se dan en el ámbito educativo, relacionadas con la situación de pandemia entre el alumnado, el profesorado y las familias, desde una perspectiva feminista. Analizar las propuestas de cambio que proponen estas profesionales de la educación ante posibles repeticiones de situaciones de emergencia similares.
Resultados: Los docentes se han visto sobrecargados por el trabajo en confinamiento, en general el tiempo de trabajo ha tomado las casas, los espacios familiares, el tiempo libre y los fines de semana. Las profesionales entrevistadas se ven obligadas a una conexión permanente, sin limitación horaria y con horarios condicionados por las familias del alumnado. Se distinguen dos períodos bien diferenciados, en que los objetivos pasaron de ser emocionales a académicos. Como problemática general surge la falta de coordinación dentro los centros educativos.
Método: Análisis de entrevistas semiestructuradas a través de la metodología de análisis crítico de discurso.
Fuente de datos: Entrevistas
Autores: Melani Penna Tosso, Mercedes Sánchez Sáinz y Cristina Mateos Casado
Año: 2020
Institución: Universidad Complutense de Madrid
País al que refiere el análisis: España
Tipo de publicación: Revista arbitrada
"Experiencias booktuber: Más allá del libro y de la pantalla"
Maria Del Mar Suárez
Cristina Alcaraz Andreu
University of Barcelona
2020, R. Roig-Vila (Coord.), J. M. Antolí Martínez & R. Díez Ros (Eds.), XARXES-INNOVAESTIC 2020. Llibre d’actes / REDES-INNOVAESTIC 2020. Libro de actas (pp. 479-480). Alacant: Universitat d'Alacant. ISBN: 978-84-09-20651-3.
Recursos educativos abiertos (REA) en las universidades españolas. Open educational resources (OER) in the Spanish universities. Gema Santos-Hermosa; Eva Estupinyà; Brigit Nonó-Rius; Lidón París-Folch; Jordi Prats-Prat
El modelo flipped classroom: un reto para una enseñanza centrada en el alumnoeraser Juan José Calderón
Este documento presenta el índice del número 391 de la Revista de Educación, correspondiente a enero-marzo de 2021. La revista es un medio de difusión de investigaciones y avances en educación publicado por el Ministerio de Educación de España. El número presentado es monotemático y se centra en el modelo de enseñanza conocido como "flipped classroom". Incluye 7 artículos en la sección monográfica sobre este tema y una sección de investigaciones.
Pensamiento propio e integración transdisciplinaria en la epistémica social. ...eraser Juan José Calderón
This document discusses using one's own thinking as a pedagogical strategy to promote critical thinking, leadership, and humanism in university students. It describes teaching an epistemology course where collaborative dynamics and transdisciplinary integration were used to develop students' cognitive abilities and social construction of knowledge. The strategy began with collaborative practice in the classroom and concluded with students publishing a reflective journal.
Escuela de Robótica de Misiones. Un modelo de educación disruptiva. 2019, Ed21. Fundación Santillana.
Carola Aideé Silvero
María Aurelia Escalada
Colaboradores:
Alejandro Piscitelli
Flavia Morales
Julio Alonso
La Universidad española Frente a la pandemia. Actuaciones de Crue Universidad...eraser Juan José Calderón
Este documento resume el contexto internacional de la pandemia de COVID-19 y sus efectos en la educación superior a nivel mundial. Se cerraron universidades en 185 países, afectando al 90% de los estudiantes. Las instituciones tuvieron que adaptar rápidamente la enseñanza a la modalidad online. Organismos internacionales como la UNESCO y el Banco Mundial publicaron recomendaciones para garantizar la continuidad educativa y mitigar los impactos sociales y económicos a corto y largo plazo. Además, asociaciones
Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...eraser Juan José Calderón
Covid-19 and IoT: Some Perspectives on the Use of
IoT Technologies in Preventing and Monitoring
COVID-19 Like Infectious Diseases & Lessons
Learned and Impact of Pandemic on IoT
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
The Journal of The British Blockchain Association The JBBA Vol 2, Issue 1, May 2019
1. VOLUME 2 | ISSUE 1 | ISSN PRINT: 2516-3949
EDITION MAY 2019
The Journal of The
British Blockchain
Association
britishblockchainassociation.org/jbba
Crypto-friendly Index
for the APEC Region
Valuation Method of
Equity-based Security
Token Offerings (STOs)
Initial Coin Offerings:
Are they Scams?
An Empirical Study
Parameters for Building
Sustainable Blockchain
Application Initiatives
Application of Behavioural Heuristics
to ICO Valuation and Investment
Blockchain and Supply Chains:
Value Redistributions,
De-commoditisation
and Quality Proxies
Evaluation of Post-Quantum
Distributed Ledger
Cryptography
Is EBB the New Currency
of Blockchain Effectiveness?
evidence
based
blockchain
ACADEMIC PARTNERS
Proceedings of 1st
Blockchain International Scientific Conference 2019
The British Blockchain Association
Collaboration. Innovation. Excellence
2.
3. The JBBA | Volume 2 | Issue 1 | May 2019
jbbathe
3
table of contents
Editorial
Editorial Board
Testimonials from Authors & Readers
7
11
14
Peer-Reviewed Research
conference proceedings
17
Valuation Method of Equity-based Security Token Offerings (STO) for Start-Up Companies
Toward a Crypto-friendly Index for the APEC Region
Cryptocurrencies & Initial Coin Offerings: Are they Scams? - An Empirical Study
Parameters for building sustainable Blockchain Application Initiatives
The Application of Behavioural Heuristics to Initial Coin Offerings Valuation and Investment
Blockchain and Supply Chains: V-form Organisations, Value Redistributions,
De-commoditisation and Quality Proxies
39
47
67
85
85
86
86
87
87
88
88
89
90
91
75
57
27
Evaluation of Post-Quantum Distributed Ledger Cryptography
Blockchain investigations – Beyond Money
Cryptocurrencies & Initial Coin Offerings: Are they Scams? An Empirical Study
The Application of Behavioural Heuristics to ICO Valuation and Investment
Assigning Residual Rights to Smart Contracts
Parameters for building sustainable blockchain application initiatives
Blockchains and Financial Intermediation – An alternative approach to monitor the Monitors
Capital mobility in light of emerging technologies: the case of crypto-asset investment
Blockchain and Distributed Ledger Cryptography Evaluation in Post-Quantum World
Leveraging Blockchain Technology for the Social Determinants of Health
Distributed Stateless Society: Liberty, Manorialism and State
Data Transparency in Interbank Lending
9. The JBBA | Volume 2 | Issue 1 | May 2019
jbbathe
9
It gives me great pleasure to present to you the 3rd
Edition of the Journal of the British Blockchain
Association.
This volume draws most of its contents from the
proceedings of the Blockchain International
Scientific Conference (ISC2019) held in London
on 12 March. The event was a big success and was
supported by many governmental, academic and
international institutions including The BBC, The
Open University, Edinburgh Napier University,
Ulster University, University of Burgundy and Web3
Labs, to name a few. It was held under the title:
"Scholars in Blockchain building Evidence based
Frameworks". The ISC2019 was accredited for 6
CPD (Continuing Professional Development) credits
by the UK CPD Certification Services. The conference
proved to be an excellent forum for exchange of
scholarly ideas, ground-breaking research and academic
networking.
Prize winner Maxwell Stanley from University of
Essex, UK, presented his research on “The Application
of Behavioural Heuristics to ICO Valuation and Investment.”
Robert Campbell of Capitol Technology University,
USA, shared his work on “Evaluation of Post-Quantum
Distributed Ledger Cryptography” (full text of the research
is published in this issue) and Alfio Puglisi of Kings
College London, UK, showcased his research abstract
entitled, “Capital Mobility in light of Emerging Technologies:
the case of Crypto-Asset Investment”.
The research papers that were accepted for publication
in this issue are timely and topical – I believe these
are of paramount significance to global blockchain
community: Articles included in this edition are:
Distributed Ledgers and Post-Quantum Computing, Crypto
Indices for APEC region, Blockchain & De-commoditisation
of Supply Chains, Valuation frameworks for Security Token
Offerings, Parameters for building sustainable Blockchain
Applications, Application of Behavioural Heuristics to ICO
Valuation and Investment and An Empirical Study on Initial
Coin Offerings.
We are committed to immediate and full Open Access
of all contents published via the JBBA. The journal is
now being read in over 150 Countries and territories.
I was pleased to see that many PhD and MSc scholars
have started citing the research published in the JBBA
and the articles are being hosted on the websites of
some of the most prestigious international universities.
Earlier this year, we awarded the Fellowship of the
British Blockchain Association to individuals that
have made exceptional contributions in the field of
blockchain and cryptocurrencies. I would like to once
EDITORIAL
again welcome our inaugural Fellows and looking
forward to work very closely with them to advance
Evidence Based Blockchain and The JBBA.
We have also launched The JBBA YouTube Channel.
There are plans to upload cutting-edge scholarly
contents including latest journal updates, debates,
reviews and commentaries from researchers, reviewers
and editorial board members.
Thejournalcontinuestoattracthighqualitysubmissions
from a very diverse global community of blockchain
scholars. It will continue to play a central role in
advancing Evidence Based practices and dialogue in
the field of Distributed Ledger Technologies.
Lastly, I would like to thank our editors, reviewers,
authors and readers who have shown faith in our
collaborative efforts in order to build a very close-
knit community of blockchain scholars. We invite
researchers from the field of Blockchain, Distributed
Ledgers and Cryptocurrencies to submit their work to
us and thus be involved in one of the fastest growing
areas of research today.
I hope you find the contents of this edition enjoyable
and beneficial. Please send us your comments to help
strengthen our efforts.
Until next time,
Dr. Naseem Naqvi
FRCP FHEA MAcadMedEd
Editor-in-Chief
May 2019
Dr. Naseem Naqvi
Editor-in-Chief
11. The JBBA | Volume 2 | Issue 1 | May 2019
jbbathe
11
editorial board
Editor-In-Chief:
Dr. Naseem Naqvi
FRCP FHEA MAcadMedEd FBBA
Associate Editor-In-Chief:
Professor Dr. Kevin Curran PhD
Cybersecurity
Professor Dr. Marc Pilkington PhD
Cryptocurrencies/ Digital Tech
Professor Dr. John Domingue PhD
Artificial Intelligence/ Education
Professor Dr. David Lee K Chuen PhD
Applied Blockchain
Professor Dr. Bill Buchanan PhD
Cryptography/ Cybersecurity
Contributing Editors & Reviewers:
Professor Dr. Mary Lacity PhD
Blockchain/ Information Systems
Professor Dr. Wulf Kaal PhD
Blockchain & Law
Professor Dr. Jason Potts PhD
Applied Blockchain
Professor Dr. Chris Sier PhD
DLT in Finance / Capital Markets
Professor Dr. Anne Mention PhD
Blockchain & Economics
Professor Dr. Shada Alsalamah PhD
Healthcare Informatics & Blockchain
Professor Dr. Jim KS Liew PhD
Blockchain, Finance, AI
Professor Dr. Eric Vermeulen PhD
Financial Law, Business, Economics
Professor Dr. Jeff Daniels PhD
Cybersecurity, Cloud Computing
Professor Dr. Mark Lennon PhD
Cryptocurrencies, Finance, Business
Professor Dr. Walter Blocher PhD
Blockchain, Law, Smart Contracts
Professor Dr. Clare Sullivan PhD
Cybersecurity / Digital Identity
Professor Dr. Andrew Mangle PhD
Cryptocurrency, Smart contracts
Professor Dr. Isabelle C Wattiau PhD
Information Systems, Smart Data
Professor Dr. Lee McKnight PhD
IoT & Blockchain
Professor Dr. Chen Liu PhD
Fintech, Tokenomics
Professor Dr. Markus Bick PhD
Business Information Systems
Dr. Stefan Meyer PhD
Blockchain in Food Supply Chain
Dr. Marcella Atzori PhD
GovTech/ Smart Cities
Dr. Mureed Hussain MD MSc
Blockchain Governance
Dr. Maria Letizia Perugini PhD
Digital Forensics & Smart Contracts
Dr. Stylianos Kampakis PhD
ICOs, Big Data, Token Economics
Dr. Phil Godsiff PhD
Cryptocurrencies
Dr. Sean Manion PhD
Blockchain in Health Sciences
Dr. Duane Wilson PhD
Cybersecurity/ Computer Science
Dr. Darcy Allen PhD
Economics/Innovation
Dr. Christian Jaag PhD
Crypto-economics, Law
Dr. Larissa Lee JD
Blockchain & Law
Dr. Jeremy Kronick PhD
Blockchain & Finance/ Economics
Dr. Hossein Sharif PhD
Blockchain, AI, Cryptocurrencies
12. The JBBA | Volume 2 | Issue 1 | May 2019
jbbathe
12
Dr. Wajid Khan PhD
Big Data, E-Commerce
Dr. Ifigenia Georgiou PhD
Crypto-economics
Dr. Anish Mohammed MSc
Crypto-economics, Security
Demelza Hays MSc
Cryptocurrencies
Alastair Marke FRSA MSc
Blockchain & Climate Finance
Adam Hayes MA BS CFA
Blockchain & Political Sociology
Jared Franka BSc
Cryptocurrency / Network Security
Navroop K Sahdev MSc
Innovation / Applied Blockchain
Raf Ganseman
DLT in Trade & Music Industry
Sebastian Cochinescu MSc
Blockchain in Culture Industry
Jared Polites MSc
ICOs & Cryptocurrencies
Managing Editor:
Saba Arshad MSc
Machine Learning
Publishing Consultant:
John Bond
Marketing & Public Relations Assistant:
Jay Guest
Type-setting, Design & Publishing:
Zeshan Mahmood
13. The JBBA | Volume 2 | Issue 1 | May 2019
jbbathe
13
14. The JBBA | Volume 2 | Issue 1 | May 2019
jbbathe
14
Testimonials from Authors and Readers
The JBBA has an outstandingly streamlined submissions process, the reviewers
comments have been constructive and valuable, and it is outstandingly well produced,
presented and promulgated. It is in my opinion the leading journal for blockchain
research and I expect it to maintain that distinction under the direction of its forward-
looking leadership team.
Dr Brendan Markey-Towler PhD, University of Queensland, Australia
“
“
“
“
“
“
“
“
“
“
“
“
It is really important for a future world to be built around peer-review and publishing
in the JBBA is one good way of getting your view-points out there and to be shared
by experts.
Professor Dr. Bill Buchanan OBE PhD, Edinburgh Napier University, Scotland
The JBBA has my appreciation and respect for having a technical understanding
and the fortitude for publishing an article addressing a controversial and poorly
understood topic. I say without hesitation that JBBA has no equal in the world of
scientific Peer-Review Blockchain Research.
Professor Rob Campbell, Capitol Technology University, USA
Within an impressively short time since its launch, the JBBA has developed a strong
reputation for publishing interesting research and commentary on blockchain
technology. As a reader, I find the articles uniformly engaging and the presentation
of the journal impeccable. As an author, I have found the review process to be
consistently constructive.
Dr. Prateek Goorha PhD, Blockchain Researcher and Economist
We live in times where the pace of change is accelerating. Blockchain is an emerging
technology. The JBBA’s swift review process is key for publishing peer-reviewed
academic papers, that are relevant at the point they appear in the journal and beyond.
Professor Daniel Liebau, Visiting Professor, IE Business School, Spain
The JBBA submission process was efficient and trouble free. It was a pleasure to
participate in the first edition of the journal.
Dr. Delton B. Chen PhD, Global4C, USA
15. The JBBA | Volume 2 | Issue 1 | May 2019
jbbathe
15
“
“
“
“
“
“
“ “
“
“
“
“
“
“
This is a very professionally presented journal.
Peter Robinson, Blockchain Researcher & Applied Cryptographer, PegaSys, ConsenSys
Very professional and efficient handling of the process, including a well-designed
hard copy of the journal. Highly recommend its content to the new scientific field
blockchain is creating as a combination of CS, Math and Law. Great work!
Simon Schwerin MSc, BigChain DB and Xain Foundation, Germany
JBBA has quickly become the leading peer-reviewed journal about the fastest growing
area of research today. The journal will continue to play a central role in advancing
blockchain and distributed ledger technologies.
John Bond, Senior Publishing Consultant, Riverwinds Consulting, USA
I had the honour of being an author in the JBBA. It is one of the best efforts
promoting serious blockchain research, worldwide. If you are a researcher, you
should definitely consider submitting your blockchain research to the JBBA.
Dr. Stylianos Kampakis PhD, UCL Centre for Blockchain Technologies, UK
I would like to think of the JBBA as an engine of knowledge and innovation,
supporting blockchain industry, innovation and stimulate debate.
Dr. Marcella Atzori PhD, EU Parliament & EU Commission Blockchain Expert, Italy
The overarching mission of the JBBA is to advance the common monologue within
the Blockchain technology community. JBBA is a leading practitioners journal for
blockchain technology experts.
Professor Dr. Kevin Curran PhD, Ulster University, Northern Ireland
The articles in the JBBA explain how blockchain has the potential to help solve
economic, social, cultural and humanitarian issues. If you want to be prepared for the
digital age, you need to read the JBBA. Its articles allowed me to identify problems,
find solutions and come up with opportunities regarding blockchain and smart
contracts.
Professor Dr. Eric Vermeulen, Tilburg University, The Netherlands
17. The JBBA | Volume 2 | Issue 1 | May 2019
jbbathe
17
OPEN ACCESS
ISSN Print: 2516-3949
https://doi.org/10.31585/jbba-2-1-(4)2019
Robert E. Campbell Sr.
Capitol Technology University, USA
Correspondence: rc@medcybersecurity.com
Received: 8 January 2019 Accepted: 26 February 2019 Published: 16 March 2019
Peer-reviewed Research
Evaluation of Post-Quantum
Distributed Ledger Cryptography
This paper evaluates the current cybersecurity vulnerability of the prolific use of Elliptical Curve Digital
Signature Algorithm (ECDSA) cryptography in use by the Bitcoin Core, Ethereum, Bitcoin Cash,
and enterprise blockchains such as Multi-Chain and Hyperledger projects Fabric, and Sawtooth Lake.
These blockchains are being used in media, health, finance, transportation and government with little
understanding, acknowledgment of the risk and no known plans for mitigation and migration to safer
public-key cryptography. The second aim is to evaluate ECDSA against the threat of Quantum Computing
and propose the most practical National Institute of Standards and Technology (NIST) Post-Quantum
Cryptography candidate algorithm lattice-based cryptography countermeasure that can be implemented
near-term and provide a basis for a coordinated industry-wide lattice-based public-key implementation.
Commercial quantum computing research and development is rapid and unpredictable, and it is difficult to
predict the arrival of fault-tolerant quantum computing. The current state of covert and classified quantum
computing research and advancement is unknown and therefore, it would be a significant risk to blockchain
and Internet technologies to delay or wait for the publication of draft standards. Since there are many
hurdles Post-Quantum Cryptography (PQC) must overcome for standardisation, coordinated large-scale
testing and evaluation should commence promptly.
Abstract
Keywords: ECDSA, blockchain, post-quantum, lattice-based cryptography, cybersecurity, distributed ledger, qTESLA,
Ring Learning with Errors, critical infrastructure
JEL Classifications: D02, D71, H11, P16, P48, P50
Competing Interests:
None declared.
Ethical approval:
Not applicable.
Author’s contribution:
RC designed and coordinated
this research and prepared
the manuscript in entirety.
Funding:
None declared.
Acknowledgements:
RC would like to
acknowledge Dr. Ian
McAndrew for his
supervision and guidance in
preparing this research.
1. Introduction
Rapid advances on a global scale in Quantum
Computing technologies and the threat it poses to most
standardized encryption prompted NIST to put out
an international call for candidate quantum-resistant
public-key cryptographic algorithms to evaluate for
standardization. NIST will conduct efficiency analysis
on their reference platform delineated in the Call for
Proposals; NIST invites the public to perform similar
tests and compare results on additional platforms (e.g.,
8-bit processors, digital signal processors, dedicated
complementary metal oxide semiconductor (CMOS),
etc.) and provide comments regarding the efficiency
of the submitted algorithms when implemented in
hardware.
This research has two goals: the first is to examine the
vulnerabilities in current Asymmetric Digital Signature
Cryptography (ASDC) as used in private key generation
in Bitcoin Blockchain technology in the PQC era.
The second goal is to independently test and evaluate
candidate NIST algorithms to assist in the process
of selection of acceptable candidate cryptosystems
for standardisation and the proposal of potential
replacement of ADSC in private key generation in
blockchain and distributed ledger technology. Most
blockchain and distributed ledger technologies use an
asymmetric digital signature scheme for private key
generation such as, ECDSA, which has been cloned
often from the Bitcoin Blockchain. These digital
signature schemes are being implemented in critical
sectors of government and the economy. Evaluations
will include cryptographic strengths and weaknesses
of NIST candidate pool of submitted algorithms. It
is expected that the analysis will consist of required
performance parameters that include:
Public Key, Ciphertext, and Signature Size, Computational
Efficiency of Public and Private Key Operations, Computational
Efficiency of Key Generation, and Decryption Failures against
NIST provided Known Answer Test values (KAT).
18. The JBBA | Volume 2 | Issue 1 | May 2019
jbbathe
18
Blockchain and Distributed Ledger cryptography
private key generation cyber-security concepts are
poorly understood, and often misrepresented. There is
a misconception that Blockchain technology can’t “be
hacked,” resulting in a general endorsement for critical
sectors and industries [1]. The author believes that
the technology offers excellent cyber-security promise
for many areas, but the limitations and strengths must
be defined. This work examines the weakness of the
ECDSA and its current vulnerability and uses in the
Bitcoin Blockchain or Distributed Ledger Technology
(DLT). Many industries are rapidly adopting versions
or mutations of the first of the Bitcoin Blockchain
technology in essential sectors such as information
technology, financial services, government facilities,
healthcare, and Public Health Sector seemingly, without
cybersecurity due diligence, a proper comprehension of
the cryptography vulnerabilities or plans for addressing
quantum computing threats [2]. The ECDSA is the
foundation of Public Key Infrastructure (PKI) for
many Internet applications and open source projects,
and it’s the primary source for public-key cryptography.
The second part of this paper offers the most practical
and near-term first-round candidate NIST Lattice-
Based Post-Quantum Cryptography solution with a
recommendation for immediate coordinated (academia,
the private sector, government) independent testing,
verification, and validation (IV&V) and test framework
for sharing results [3]. This framework aids in speeding
the approval of PQC standards that are vital to global
cybersecurity. The scope of this work evaluates
the lattice-based digital signature scheme qTESLA,
based on the verifiable hardness of the decisional
Ring Learning With Errors (R-LWE) [4]. Quantum
computing’s threat adversely affects the cybersecurity
of financial services such as payment systems, general
network communications systems, business functions
including cloud computing, Internet of Things (IoT)
and critical infrastructure. Further, the author believes
that currently estimated timelines for the availability
of large-scale fault-tolerant quantum computers are
underestimated due to unpredicted global progress
and the veil of secrecy surrounding classified research
programs led by organizations and governments
around the globe. It is, therefore, essential to begin
work and testing the most likely candidate algorithms
for normalization.
2. Implications in this work
Current encryption systems and standards such as
Ron Rivest, Adi Shamir and Leonard Adleman (RSA),
Digital Signature Algorithm (DSA), and ECDSA
impact everything from defense, banking, healthcare,
energy, telecommunications, intelligence, Internet
and the Blockchain. The compromise, disruption or
non-availability of one of these sectors would severely
impact the health and safety of U.S. national security,
public health, safety or its economy.
Blockchain technology is a revolutionary technology
that has great potential in many applications. This
technology has gained global interest in all industry
sectors based on cryptography-based algorithms that
are considered vulnerable today but will be increasingly
threatened by accelerated advances in quantum
computing.
3. Significance of the findings
The time to test and validate new post-quantum
cryptology is now, given it takes at least ten years to
build and deliver a new public key infrastructure. The
pace at which quantum computing advancements
can be anticipated is uncertain. The ability to
transition to post-quantum cryptology appears to
be very complicated, and there are many unknowns
concerning establishing, standardizing and deploying
post-quantum cryptography systems. All of this must
be completed before the arrival of large-scale quantum
computers because the cybersecurity of many vital
services will be severely degraded.
4. Bitcoin and Distributed Ledger Technology
The Bitcoin Cryptocurrency (BTC) is the first
widespread application of blockchain technology. The
critical elements of Blockchain and DLT have been in
existence for decades, and they include fault-tolerance,
distributed computing, and cryptography. Succinctly,
the first iteration of this technology is a decentralized
distributed database that keeps records of transactions
relatively secure and in an append-only mode, where
all peers eventually come to a consensus regarding
the state of a transaction. The Bitcoin Blockchain like
others operates in an open peer-to-peer (P2P) network,
where each node can function as a client and a server at
the same time. The nodes in the system are connected
over TCP/ IP and once a new node is connected that
node broadcast peer IP addresses via Bitcoin address
messages. Each address maps to a unique public
and private key; these keys are used to exchange
ownership of BTCs among addresses. A Bitcoin
address is an identifier of 26 to 35 alphanumeric
characters [5] . Since the advent of BTC along with
its choice of a data structure, called a block, modified
blockchain technologies, makes use of different data
structures such as Directed Acyclic Graph (DAGs).
Therefore, recent versions of the newest blockchains
can longer accurately be called blockchains, and it is
more appropriate to use the term Distributed Ledger
(DL) that applies to all version of the blockchain.
Presently, according to Crypto-Currency Market
Capitalizations [6], there are more than 2000 alternate
cryptocurrencies, and most make use of the Bitcoin
Blockchain or are clones with minor differences in the
private key generation cryptography and structure. The
primary configuration changes include the underlying
hash function, block generation times, data structures
19. The JBBA | Volume 2 | Issue 1 | May 2019
jbbathe
19
and method of distributed consensus. However; the
critical task of generating private keys in blockchains
remains unchanged across most blockchain adaptions,
and this work asserts that the foundation of the
current cryptocurrency markets and all the private and
public sectors using this technology are vulnerable to
the same cybersecurity weaknesses.
5. ECDSA, libsecp256k1 and OpenSSL
The ECDSA algorithm is part of public-key
cryptography and is also the cryptography the Bitcoin
blockchain uses to generate the public and private keys.
The ECDSA is used in critical infrastructure, secure
communications over the Internet, cellular and Wi-Fi
and in many blockchain forks in use today. Specifically,
the Bitcoin blockchain uses the ECDSA and the Koblitz
curve secp256k1 [7] which have significant weaknesses
which include general algorithm structure, side-channel
attacks, and threats from quantum computers. The
Koblitz Curve was not adopted for standardisation
by NIST due to the non-random structure of the
algorithm. The Bitcoin creator selected a non-NIST
P-256 approved curve to serve as a source of entropy.
Entropy is defined in this case as the randomness
inserted by an operating system or application for
use in cryptography that requires random data.
OpenSSL is an open-source software library used in
BTC technology and ECDSA applications to secure
communications and many critical infrastructures.
OpenSSL [8] provides software Pseudo Random
Number Generator (PNRG) based on a variety and
type of hardware and software sources. Its core library
is written in the C programming language. The process
starts once the Bitcoin Core client is installed, and
the user receives a set of ECDSA key pairs, called
Addresses. The PRNG starts in the state unseeded and
this state; it has zero entropy. A call to RAND bytes is
made, and it will transfer automatically into the state
seeded with a presumed entropy of 256 bits and is feed
to the PRNG through a call to RAND add. The keys
generated from this process are necessary to transfer
BTC from one Address to the other. Next, the client
needs to sign a specific message (called Transaction)
with the private key of the user. The public key is used
to check if the given user has rights to BTC [9].
The ECDSA algorithm relies on generating a
random private key used for signing messages and
a corresponding public key used for checking the
signature. The bit security of this algorithm depends
on the ability to compute a point multiplication and the
inability to calculate the multiplicand given the original
and product points.
The Koblitz curve secp256k1 is non-verifiably random
and is defined by Standards for Efficient Cryptography
Group (SECG), instead of the NIST 186-3 DSS
Standard using the elliptic curve secp256r1. The
security of the ECDSA algorithm and protocols relies
on a source of distributed random bits.
6. Fault Attack on Bitcoin’s Elliptic Curve with
Montgomery Ladder Implementation.
This Montgomery Ladder Fault Attack method is a
fault attack on elliptic curve scalar product algorithms
and can be used when the (y-coordinate) is not used.
The bit security of the elliptic curve parameters in most
cases can be significantly reduced. The Fault attack is
a robust side-channel technique that is used to break
ECDSA cryptographic schemes. The idea is to inject a
fault during the computations of implementation and
to use the faulty outputs to deduce information on the
secret key stored in the secure component [10]. Table
1 gives the resultant bit security after the Montgomery
Ladder Fault Attack.
The bold font indicates the scep256k1 security is
below 260
since these computations can be easily
performed with classical computers. The mention
’r’ denotes parameters explicitly recommended in the
standard, while the mention ’c’ denotes parameters in
conformancewiththestandard.Thecolumn“Strength”
refers to the standard. Clearly, implementations without
protections, the attacker can compute the discrete
logarithm in the twist with a cost of 250
operations and
retrieve the secret scalar for n = 256.
7. Algorithm Security Strength
Breaking a cryptographic algorithm can be defined
as defeating some aspect of the protection that the
algorithm is intended to provide. For example, a block
cipher encryption algorithm that is used to protect the
confidentiality of data is broken if, with an acceptable
amount of work, it is possible to determine the value of
its key or to recover the plaintext from the ciphertext
without knowledge of the key.
The approved security strengths for federal applications
are 128, 192 and 256 bits. Note that a security strength
of fewer than 128 bits is no longer approved because
quantum algorithms reduce the bit security to 64 bits.
NIST Special Publication 800-57 Part 1 Revision 4:
Recommended for Key Management as shown in Table
2 [11]. The Fault Attack on Bitcoin’s Elliptic Curve
with Montgomery Ladder Implementation yields
security strength of only 50 bits as shown in Table 1.
Table 1: Curve parameter security according to
Montgomery Ladder Fault Attack [10]
5. ECDSA, libsecp256k1 and OpenSSL
The ECDSA algorithm is part of public-key cryptography and
is also the cryptography the Bitcoin blockchain uses to generate
the public and private keys. The ECDSA is used in critical
infrastructure, secure communications over the Internet,
cellular and Wi-Fi and in many blockchain forks in use today.
Specifically, the Bitcoin blockchain uses the ECDSA and the
Koblitz curve secp256k1 [7] which have significant weaknesses
which include general algorithm structure, side-channel attacks,
and threats from quantum computers. The Koblitz Curve was
not adopted for standardisation by NIST due to the non-
random structure of the algorithm. The Bitcoin creator selected
a non-NIST P-256 approved curve to serve as a source of
entropy. Entropy is defined in this case as the randomness
inserted by an operating system or application for use in
cryptography that requires random data. OpenSSL is an open-
source software library used in BTC technology and ECDSA
applications to secure communications and many critical
infrastructures. OpenSSL [8] provides software Pseudo
Random Number Generator (PNRG) based on a variety and
type of hardware and software sources. Its core library is written
in the C programming language. The process starts once the
Bitcoin Core client is installed, and the user receives a set of
ECDSA key pairs, called Addresses. The PRNG starts in the
state unseeded and this state; it has zero entropy. A call to
RAND bytes is made, and it will transfer automatically into the
state seeded with a presumed entropy of 256 bits and is feed to
the PRNG through a call to RAND add. The keys generated
from this process are necessary to transfer BTC from one
Address to the other. Next, the client needs to sign a specific
message (called Transaction) with the private key of the user.
The public key is used to check if the given user has rights to
BTC [9].
The ECDSA algorithm relies on generating a random private
key used for signing messages and a corresponding public key
used for checking the signature. The bit security of this
algorithm depends on the ability to compute a point
multiplication and the inability to calculate the multiplicand
given the original and product points.
The Koblitz curve secp256k1 is non-verifiably random and is
defined by Standards for Efficient Cryptography Group
(SECG), instead of the NIST 186-3 DSS Standard using the
elliptic curve secp256r1. The security of the ECDSA algorithm
and protocols relies on a source of distributed random bits.
6. Fault Attack on Bitcoin’s Elliptic Curve with
and to use the faulty outputs to deduce information on the
secret key stored in the secure component [10]. Table 1 gives
the resultant bit security after the Montgomery Ladder Fault
Attack.
The bold font indicates the scep256k1 security is below 260 since
these computations can be easily performed with classical
computers. The mention ’r’ denotes parameters explicitly
recommended in the standard, while the mention ’c’ denotes
parameters in conformance with the standard. The column
“Strength” refers to the standard. Clearly, implementations
without protections, the attacker can compute the discrete
logarithm in the twist with a cost of 250 operations and retrieve
the secret scalar for n = 256.
7. Algorithm Security Strength
Breaking a cryptographic algorithm can be defined as defeating
some aspect of the protection that the algorithm is intended to
provide. For example, a block cipher encryption algorithm that
is used to protect the confidentiality of data is broken if, with
an acceptable amount of work, it is possible to determine the
value of its key or to recover the plaintext from the ciphertext
without knowledge of the key.
The approved security strengths for federal applications are
128, 192 and 256 bits. Note that a security strength of fewer
than 128 bits is no longer approved because quantum
algorithms reduce the bit security to 64 bits. NIST Special
Publication 800-57 Part 1 Revision 4: Recommended for Key
Management as shown in Table 2 [11]. The Fault Attack on
Bitcoin’s Elliptic Curve with Montgomery Ladder
Implementation yields security strength of only 50 bits as
shown in Table 1.
8. NIST and Post-Quantum Cryptography
In December 2016, NIST formally announced its Call for
Proposals (Request for Nominations for Public-Key Post-
Quantum Cryptographic Algorithms), [12]. This call solicited
Table 1: Curve parameter security according to Montgomery Ladder
Fault Attack [10]
Values
secp
P1363
IPSEC
X9.62
X9.63
NIST Strength Security
256k1 c/c c/r 128 50
256r1 c/c r/r r 128 121
Table 2: Comparison of conventional and quantum security levels of
20. The JBBA | Volume 2 | Issue 1 | May 2019
jbbathe
20
8. NIST and Post-Quantum Cryptography
In December 2016, NIST formally announced its Call
for Proposals (Request for Nominations for Public-
Key Post-Quantum Cryptographic Algorithms), [12].
This call solicited proposals for post-quantum
digital signature as well as public-key encryption and
Key Encapsulation Mechanism (KEM)/Encryption
for evaluation. In response, there were 82 total
submissions, and 69 were accepted, and five withdrew.
The results and categories included 19 Signatures and
45 KEM Encryption. The Signature category which
produces private keys included five Lattice-based
submissions, and this work focuses on qTESLA’s
submission which is based on the verifiable hardness
of the decisional Ring Learning With Errors (R-LWE)
problem [4]. Public Key Systems based on R-LWE is
computationally superior over LWE systems because
of reduced overhead, greater capacity for message
space and smaller public key sizes.
9. Selected algorithm for test and evaluation:
qTESLA
The author’s considerations for the selection qTESLA,
are “reasonable” key and ciphertext sizes, and to a
lesser extent the number of CPU cycles required
for encryption, decryption, and verification, and
potential incorporation into constrained devices
such as smartphones and emerging IoT devices.
Additional considerations included trust, metrics,
parameters, migration, compatibility, and efficient
and secure implementation. This submission utilizes
two approaches for parameter generation. The first
approach is called “heuristic qTESLA," and it uses
heuristic method parameter generation and the second
approach is called “provably-secure qTESLA," and
its parameter generation is provably-secure. qTESLA
includes five parameter sets that correspond to two
security levels located in Table 3.
| 2019 Published Open Access under the CC-BY 4.0 Licence 3
, the client needs to sign a specific
n) with the private key of the user.
heck if the given user has rights to
es on generating a random private
ges and a corresponding public key
gnature. The bit security of this
he ability to compute a point
bility to calculate the multiplicand
uct points.
k1 is non-verifiably random and is
r Efficient Cryptography Group
ST 186-3 DSS Standard using the
e security of the ECDSA algorithm
urce of distributed random bits.
Bitcoin’s Elliptic Curve with
Implementation.
ault Attack method is a fault attack
oduct algorithms and can be used
not used. The bit security of the
n most cases can be significantly
is a robust side-channel technique
A cryptographic schemes. The idea
e computations of implementation
without knowledge of the key.
The approved security strengths for federal applications are
128, 192 and 256 bits. Note that a security strength of fewer
than 128 bits is no longer approved because quantum
algorithms reduce the bit security to 64 bits. NIST Special
Publication 800-57 Part 1 Revision 4: Recommended for Key
Management as shown in Table 2 [11]. The Fault Attack on
Bitcoin’s Elliptic Curve with Montgomery Ladder
Implementation yields security strength of only 50 bits as
shown in Table 1.
8. NIST and Post-Quantum Cryptography
In December 2016, NIST formally announced its Call for
Proposals (Request for Nominations for Public-Key Post-
Quantum Cryptographic Algorithms), [12]. This call solicited
Table 2: Comparison of conventional and quantum security levels of
typical ciphers [12].
Algorithm Key Length
Effective Key Strength / Security Level
Conventional
Computing
Quantum
Computing
RSA-1024 1024 bits 80 bits 0 bits
RSA-2048 2048 bits 112 bits 0 bits
ECC-256 256 bits 128 bits 0 bits
ECC-384 384 bits 256 bits 0 bits
AES-128 128 bits 128 bits 64 bits
AES-256 256 bits 256 bits 128 bits
Table 2: Comparison of conventional and
quantum security levels of typical ciphers [12].
Table 3: Adapted from The NIST
Post-Quantum Crypto “Competition” [13].OpenSSL
public-key cryptography and
in blockchain uses to generate
he ECDSA is used in critical
ications over the Internet,
blockchain forks in use today.
ain uses the ECDSA and the
h have significant weaknesses
tructure, side-channel attacks,
uters. The Koblitz Curve was
n by NIST due to the non-
and to use the faulty outputs to deduce information on the
secret key stored in the secure component [10]. Table 1 gives
the resultant bit security after the Montgomery Ladder Fault
Attack.
Table 1: Curve parameter security according to Montgomery Ladder
Fault Attack [10]
Values
secp
P1363
IPSEC
X9.62
X9.63
NIST Strength Security
256k1 c/c c/r 128 50
256r1 c/c r/r r 128 121
Security levels:
A. Heuristic qTESLA:
• qTESLA-I: NIST's security category 1.
• qTESLA-III-speed: NIST's security level 3
(option for speed).
• qTESLA-III-size: NIST's security level 3
(option for size).
B. Provably-secure qTESLA:
• qTESLA-p-I: NIST's security category 1.
• qTESLA-p-III: NIST's security category 3 [4].
The security of lattice-based systems is provably
secure under worst-case hardness assumptions. In
the author’s view, it is not likely that current PQC will
be direct replacements for current standards and will
likely impact the entire category of Internet protocols,
such as Transport Layer Security (TLS) and Internet
Key Exchange (IKE).
System parameters can be viewed in Table 4 and Table
5 on the page number 17.
10. Informal Signature Scheme
Informal descriptions of the algorithms that give
rise to the signature scheme qTESLA are shown in
Algorithms 1, 2 and 3. These algorithms require two
basic terms, namely, B-short and well-rounded, which
are defined below. Let q, LE
, LS
, and d be system
parameters that denote the modulus, the bound
constant for error polynomials, the bound constant
for the secret polynomial, and the rounding value,
respectively. An integer polynomial y is B-short if each
coefficient is at most B in absolute value. An integer
polynomial is w well-rounded if w is ([q/2] − LE
)-short
and [w]L is ( 2d−1
− LE
)-short, where [w]L
denotes the
unique integer in (−2d−1
, 2d−1
] ⊂ Z such that w = [w]L
modulo 2d
. Also, [w]M
is the value represented by all
but the d least significant bits of (w - [w]L
). Let R =
Z[x]/(xn
+ 1) and Rq
= Zq
[x]/(xn
+ 1). The hash oracle
H(.
) maps from {0, 1}* to H, where H denotes the set
of polynomials c ∈ R with coefficients in {-1, 0, 1}
with exactly h nonzero entries.
Algorithm1:Informaldescriptionof thekeygeneration.
Require - , n/a
Ensure: Secret key sk = (s; e1
, …., ek
, a1
, …, ak
), and
public key pk = (a1, …, ak, t1, … tk)
1. a1
, …, ak
← Rq
invertible ring elements.
2. Choose s ∈ R with entries from D σ. Repeat
step if the h largest entries of s sum to LS
.
3. For i = 1, …, k: Choose ei
∈ R with entries
from D σ. Repeat step at iteration i if the h
4. largest entries of ei
sum to LE
.
21. The JBBA | Volume 2 | Issue 1 | May 2019
jbbathe
21
Table 4: Description and bounds of all the system parameters [4]
Table 5: Parameters for each of the proposed heuristic and provably-secure parameter sets with qh = 2128 and qs = 264; M = 0.3 [4]
The JBBA | Volume 2 | Issue 1 | 2019 Published Open Access under the CC-BY 4.0 Licence 4
devices such as smartphones and emerging IoT devices.
Additional considerations included trust, metrics, parameters,
migration, compatibility, and efficient and secure
implementation. This submission utilizes two approaches for
parameter generation. The first approach is called “heuristic
qTESLA," and it uses heuristic method parameter generation
and the second approach is called “provably-secure qTESLA,"
size).
B. Provably-secure qTESLA:
qTESLA-p-I: NIST's security category 1.
qTESLA-p-III: NIST's security category 3 [4].
The security of lattice-based systems is provably secure under
worst-case hardness assumptions. In the author’s view, it is not
Table 4: Description and bounds of all the system parameters [4]
Parameter Description Requirement
λ security parameter -
qh, qs number of hash and sign queries -
n dimension (n – 1 is the poly. degree) power of two
σ, ξ standard deviation of centered discrete Gaussian distribution σ = ξ/ √ 2 ln 2
k #R-LWE samples -
q modulus q = 1 mod 2n, q > 4B
For provably secure parameters
qnk ≥ |∆S| ∙|∆L|∙ |∆H|
qnk ≥ 24λ+nkd 4q3s (qs + qh)2
h # of nonzero entries of output elements of Enc 2h ∙ (
n
h
) ≥ 22λ
LE, ηE
LS, ηS
bound in checkE
bound in checkS
ηE ∙ h ∙ σ
ηS∙ h ∙ σ
B interval of randomness is chosen during signing
B ≥
√𝑀𝑀𝑀𝑀
𝑘𝑘𝑘𝑘⋅𝑛𝑛𝑛𝑛
+2𝐿𝐿𝐿𝐿𝑆𝑆𝑆𝑆−1
2(−1− √𝑀𝑀𝑀𝑀
𝑘𝑘𝑘𝑘𝑛𝑛𝑛𝑛
)
, near a power of
two
d number of rounded bits
(ⅈ −
2𝐿𝐿𝐿𝐿𝐸𝐸𝐸𝐸+1
8𝑑𝑑𝑑𝑑 )
𝑘𝑘𝑘𝑘𝑘𝑘𝑘𝑘
≥ 0.3, d > log2(𝐵𝐵𝐵𝐵)
bGenA number of blocks requested to SHAKE128 for GenA bGenA 𝜀𝜀𝜀𝜀ℤ > 0
|∆H|
|∆S|
|∆L|
∑
ℎ
𝑗𝑗𝑗𝑗=0
∑ (𝑘𝑘𝑘𝑘 𝑛𝑛𝑛𝑛
2 ⅈ
)
22𝑖𝑖𝑖𝑖
(𝑘𝑘𝑘𝑘𝑗𝑗𝑗𝑗
𝑘𝑘𝑘𝑘
− 2ⅈ)
2𝑗𝑗𝑗𝑗
ℎ−𝑗𝑗𝑗𝑗
𝑖𝑖𝑖𝑖=0
(4(−𝐵𝐵𝐵𝐵 − 𝐿𝐿𝐿𝐿𝑆𝑆𝑆𝑆) + 1)𝑘𝑘𝑘𝑘
(2𝑑𝑑𝑑𝑑
+ 1)𝑘𝑘𝑘𝑘𝑘𝑘𝑘𝑘
δz
δw
δkeygen
acceptance probability of z
acceptance probability of w
acceptance probability of key pairs
experimentally
experimentally
experimentally
sig size
pk size
sk size
theoretical size of signature
theoretical size of public key
theoretical size of secret key
experimentally
experimentally
experimentally
κ output length of hash function H and input length of GenA, PRF1,
PRF2, Enc and ySampler
κ ≥ λ
likely that current PQC will be direct replacements for current
standards and will likely impact the entire category of Internet
protocols, such as Transport Layer Security (TLS) and Internet
Key Exchange (IKE).
System parameters can be viewed in Table 4 and Table 5.
10. Informal Signature Scheme
Informal descriptions of the algorithms that give rise to the
signature scheme qTESLA are shown in Algorithms 1, 2 and 3.
These algorithms require two basic terms, namely, B-short and
1. a1, …, ak ← Rq invertible ring elements.
2. Choose s ∈ R with entries from D σ. Repeat step if the h
largest entries of s sum to LS.
3. For i = 1, …, k: Choose ei ∈ R with entries from Dσ. Repeat
step at iteration i if the h
4. largest entries of ei sum to LE.
5. For i = 1, …, k: Compute ti ais + ei ∈ Rq.
6. Return sk = (s; e1, … ek; a1, … ak) and pk = (a1, … ak, t1,
…, tk).
Algorithm 2: Informal description of the signature generation.
Table 5: Parameters for each of the proposed heuristic and provably-secure parameter sets with qh = 2128 and qs = 264; M = 0.3 [4]
Parameter qTESLA-I qTESLA-III-speed qTESLA-III-size qTESLA-p-I qTESLA-p-III
λ 95 160 160 95 160
κ 256 256 256 256 256
n 512 1024 1024 1024 1024
σ, ξ 23.78, 27.9988 10.2, 12 8.49, 9.9962 8.5, 10 8.5, 10
k 1 1 1 4 5
q 4205569 8404993 4206593
≈222 ≈222 ≈222
485978113 1129725953
≈229 ≈230
h 30 48 48 25 40
LE, ηE
LS, ηS
1586, 2.223 1147, 2.34 910, 2.23
1586, 2.223 1233, 2.52 910, 2.23
554, 2.61 901, 2.65
554, 2.61 901, 2.65
B 220 -1 221 – 1 220 - 1 221 – 1 223 - 1
d 21 22 21 22 24
bGenA 19 38 38 108 180
|∆H|
|∆S|
|∆L|
≈2435.8 ≈2750.9
≈223551.6 ≈ 251199.7
≈294208.0 ≈ 22560000
δw
δz
δsign
δkeygen
0.31 0.38 0.25
0.44 0.56 0.37
0.14 0.21 0.09
0.45 0.60 0.39
0.33 0.34
0.78 0.81
0.26 0.28
0.59 0.44
sig size
pk size
sk size
1376 2848 2720
1504 3104 2976
1216 2112 2112
2848 6176
14880 39712
4576 12320
classical bit hardness
quantum bit hardness
104 178 188
97 164 169
132 247
123 270
5. For i = 1, …, k: Compute ti
ai
s + ei
∈ Rq.
6. Return sk = (s; e1, … ek; a1, … ak) and pk
= (a1, … ak, t1, …, tk).
Algorithm 2: Informal description of the signature
generation.
Require: Message m, secret key sk = (s; e1
, … ek
, a1
, … ak
)
22. The JBBA | Volume 2 | Issue 1 | May 2019
jbbathe
22
Ensure: Signature (z; c)
1. Choose y uniformly at random among
B-short polynomials in Rq
.
2. c ← H([ a1
y ]M
, ..., [ ak
y ]M
, m).
3. Compute z ← y + sc.
4. If z is not ( B − LS
)-short then retry at step 1.
5. For i = 1, ..., k: If ai
y − ei
c is not well-
rounded then retry at step 1.
6. Return (z , c).
Algorithm 3: Informal description of the signature
verification.
Require: Message m, public key pk = (a1
, …, ak
, t1
, …,
tk
), and signature (z, c)
Ensure: “Accept" or “reject" signature
1. If z is not (B - LS)-short then return reject.
2. For i = 1, …, k: Compute wi ← aiz - tic ∈ Rq.
3. If c ≠ H([w1]M, …, [wk]M, m) then return
reject.
4. Return accept [4].
Performance of post-quantum qTESLA algorithms
analysis
To evaluate the performance of the provided
implementations written in portable C, the author ran
benchmarking suite on three machines powered by:
(i) an Intel® Core™ i7-6500 CPU @ 2.50 GHz x 4
(Skylake) processor (see table 4) (ii) an Intel® Core™
i5-6400T CPU @ 2.20GHz (VMWARE)(Haswell)
processor (see table 5) (iii) an Intel® Core™ i7-
2630QM CPU @ 2.00GHz × 8 (Haswell) (see table
6) all running Ubuntu 18.04.1 LTS. For compilation,
GCC version 7.3.0 was used in all test.
11. Analysis
The author argued that the uncertainties had not
been appropriately addressed. For example, there is
the possibility that additional quantum algorithms or
techniques will be developed, which will lead to new and
unanticipated attacks. Also, it is difficult to calculate the
impact of those programs that are highly classified, and
its performance characteristic is not public. Rapid and
unpredictable advancements in quantum computing,
are endangering or making current encryption
schemes obsolete. It has been established that the
most significant threat posed by quantum computers
is directed towards current RSA, ECC digital signature
scheme systems on which Bitcoin, Distributed Ledger
and much of Internet-based technology uses.
It has been settled that the current RSA and ECC
based public key cryptography are broken, and the
AES cryptography is adversely reduced in bit security
by quantum computing era. It is the author’s view that
recommendations such as doubling the AES key size
need to be examined while considering the constraints
of present systems. Current AES-128 is reduced to 64-
bit security, and AES-256 would have 128-bit security.
An example of the impact of doubling the key size
for AES-256 to AES-512 is not well documented and
verified. This alternative algorithm (AES-512) would
most likely use input block size and a key size of 512-
bits. An increasing number of rounds and key schedule
would adversely impact performance constraints,
especially for constrained devices. The higher the key
size, the more secure the ciphered data, but also the
more rounds needed. In the hardware perspective,
a bigger key size also means a larger area and power
consumption due to more operations that need to be
done. More focus and examination need to be done for
AES in the PQC era, especially for constrained devices.
The author specifically, examined the ECDSA that are
in use in Bitcoin and Distributed Ledger technologies.
Secondly, evaluated NIST Candidate PQC for
standardisation and possible replacement in blockchain
and other public key cryptography Internet-based
technologies. Table 6 gives the ECDSA (P-256)
parameters used as the benchmark for comparison
regarding the number of quantum security bits, and the
size of the public key, secret key and signature key as an
independently controlled variable. According to NIST,
the use of schemes with less than 112-bit security is
deprecated and will eventually be disallowed for use by
U.S. government institutions to handle sensitive data.
It is noted that that speed at which the encryption and
decryption occurs is also an important parameter.
1. If z is not (B - LS)-short then return reject.
2. For i = 1, …, k: Compute wi ← aiz - tic ∈ Rq.
3. If c ≠ H([w1]M, …, [wk]M, m) then return reject.
4. Return accept [4].
Performance of post-quantum qTESLA algorithms
analysis
To evaluate the performance of the provided implementations
written in portable C, the author ran benchmarking suite on
three machines powered by: (i) an Intel® Core™ i7-6500 CPU
@ 2.50 GHz x 4 (Skylake) processor (see table 4) (ii) an Intel®
Core™ i5-6400T CPU @ 2.20GHz (VMWARE)(Haswell)
processor (see table 5) (iii) an Intel® Core™ i7-2630QM CPU
@ 2.00GHz × 8 (Haswell) (see table 6) all running Ubuntu
18.04.1 LTS. For compilation, GCC version 7.3.0 was used in
all test.
11. Analysis
The author argued that the uncertainties had not been
appropriately addressed. For example, there is the possibility
that additional quantum algorithms or techniques will be
developed, which will lead to new and unanticipated attacks.
Also, it is difficult to calculate the impact of those programs
that are highly classified, and its performance characteristic is
not public. Rapid and unpredictable advancements in quantum
computing, are endangering or making current encryption
schemes obsolete. It has been established that the most
significant threat posed by quantum computers is directed
towards current RSA, ECC digital signature scheme systems on
which Bitcoin, Distributed Ledger and much of Internet-based
technology uses.
It has been settled that the current RSA and ECC based public
key cryptography are broken, and the AES cryptography is
adversely reduced in bit security by quantum computing era. It
is the author’s view that recommendations such as doubling the
AES key size need to be examined while considering the
constraints of present systems. Current AES-128 is reduced to
64-bit security, and AES-256 would have 128-bit security.
An example of the impact of doubling the key size for AES-256
to AES-512 is not well documented and verified. This
alternative algorithm (AES-512) would most likely use input
block size and a key size of 512-bits. An increasing number
possible replacement in blockchain and other public key
cryptography Internet-based technologies. Table 6 gives the
ECDSA (P-256) parameters used as the benchmark for
comparison regarding the number of quantum security bits, and
the size of the public key, secret key and signature key as an
independently controlled variable. According to NIST, the use
of schemes with less than 112-bit security is deprecated and will
eventually be disallowed for use by U.S. government
institutions to handle sensitive data. It is noted that that speed
at which the encryption and decryption occurs is also an
important parameter.
Table 6: ECDSA; signature and key sizes are given in bytes [4].
Software/
Scheme
Computation
Assumption
Bit
Security
Key Size
(bytes)
Signature
Size
(bytes)
ECDSA
(P-256)
Elliptic Curve
Discrete
Logarithm
128 pk: 64
sk: 96
64
Table 7: Intel® Core™ i7-6500 (Skylake) CPU @ 2.50 GHz x 4
Scheme Keygen Sign Verify
Total (sign +
verify) median
qTESLA-I 1321.3 402.4 82.6 485
qTESLA-III-
speed
2987.6 551 168.8 719.8
qTESLA-III-
size
5042.8 1035.8 170.4 1206.2
qTESLA-p-I 5370.1 1033.2 423.4 1456.6
qTESLA-p-III 25791.8 4223.2 2134 6357.2
Scheme Keygen Sign Verify
Total (sign +
verify) average
qTESLA-I 1501.7 557.3 87.1 644.4
qTESLA-III-
speed
3349.9 747.2 172.9 920.1
qTESLA-III-
size
5329.7 1448.6 171.8 1620.4
qTESLA-p-I 5545.3 1328.9 428 1756.9
qTESLA-p-III 27570.3 5254.8 2156.4 7411.2
Table 8: Intel® Core™ i5-6400T CPU @ 2.20GHz (VMWARE)
Scheme Keygen Sign Verify
Total (sign +
verify) median
qTESLA-I 1460 461 88.7 550.0
qTESLA-III-
speed
3217 634.8 180.8 815.7
1. If z is not (B - LS)-short then return reject.
2. For i = 1, …, k: Compute wi ← aiz - tic ∈ Rq.
3. If c ≠ H([w1]M, …, [wk]M, m) then return reject.
4. Return accept [4].
Performance of post-quantum qTESLA algorithms
analysis
To evaluate the performance of the provided implementations
written in portable C, the author ran benchmarking suite on
three machines powered by: (i) an Intel® Core™ i7-6500 CPU
@ 2.50 GHz x 4 (Skylake) processor (see table 4) (ii) an Intel®
Core™ i5-6400T CPU @ 2.20GHz (VMWARE)(Haswell)
processor (see table 5) (iii) an Intel® Core™ i7-2630QM CPU
@ 2.00GHz × 8 (Haswell) (see table 6) all running Ubuntu
18.04.1 LTS. For compilation, GCC version 7.3.0 was used in
all test.
11. Analysis
The author argued that the uncertainties had not been
appropriately addressed. For example, there is the possibility
that additional quantum algorithms or techniques will be
developed, which will lead to new and unanticipated attacks.
Also, it is difficult to calculate the impact of those programs
that are highly classified, and its performance characteristic is
not public. Rapid and unpredictable advancements in quantum
computing, are endangering or making current encryption
schemes obsolete. It has been established that the most
significant threat posed by quantum computers is directed
towards current RSA, ECC digital signature scheme systems on
which Bitcoin, Distributed Ledger and much of Internet-based
technology uses.
It has been settled that the current RSA and ECC based public
key cryptography are broken, and the AES cryptography is
adversely reduced in bit security by quantum computing era. It
is the author’s view that recommendations such as doubling the
AES key size need to be examined while considering the
constraints of present systems. Current AES-128 is reduced to
64-bit security, and AES-256 would have 128-bit security.
An example of the impact of doubling the key size for AES-256
possible replacement in blockchain and other public key
cryptography Internet-based technologies. Table 6 gives the
ECDSA (P-256) parameters used as the benchmark for
comparison regarding the number of quantum security bits, and
the size of the public key, secret key and signature key as an
independently controlled variable. According to NIST, the use
of schemes with less than 112-bit security is deprecated and will
eventually be disallowed for use by U.S. government
institutions to handle sensitive data. It is noted that that speed
at which the encryption and decryption occurs is also an
important parameter.
Table 6: ECDSA; signature and key sizes are given in bytes [4].
Software/
Scheme
Computation
Assumption
Bit
Security
Key Size
(bytes)
Signature
Size
(bytes)
ECDSA
(P-256)
Elliptic Curve
Discrete
Logarithm
128 pk: 64
sk: 96
64
Table 7: Intel® Core™ i7-6500 (Skylake) CPU @ 2.50 GHz x 4
Scheme Keygen Sign Verify
Total (sign +
verify) median
qTESLA-I 1321.3 402.4 82.6 485
qTESLA-III-
speed
2987.6 551 168.8 719.8
qTESLA-III-
size
5042.8 1035.8 170.4 1206.2
qTESLA-p-I 5370.1 1033.2 423.4 1456.6
qTESLA-p-III 25791.8 4223.2 2134 6357.2
Scheme Keygen Sign Verify
Total (sign +
verify) average
qTESLA-I 1501.7 557.3 87.1 644.4
qTESLA-III-
speed
3349.9 747.2 172.9 920.1
qTESLA-III-
size
5329.7 1448.6 171.8 1620.4
qTESLA-p-I 5545.3 1328.9 428 1756.9
qTESLA-p-III 27570.3 5254.8 2156.4 7411.2
Table 8: Intel® Core™ i5-6400T CPU @ 2.20GHz (VMWARE)
Scheme Keygen Sign Verify
Total (sign +
verify) median
Table 6: ECDSA; signature and key sizes are given in bytes [4].
Table 7: Intel® Core™ i7-6500 (Skylake) CPU @ 2.50 GHz x 4
23. The JBBA | Volume 2 | Issue 1 | May 2019
jbbathe
23
Table 9: Intel® Core™ i7-2630QM CPU @ 2.00GHz × 8
The JBBA | Volume 2 | Issue 1 | 2019 Published Open Access under the CC-BY 4.0 Licence 7
The following results cannot be compared directly with the
vendor qTESLA’s submitted results, but; specific observations
can be made with alternative applications and platforms. It is
the author’s view that if the key sizes are not manageable and
practical for use in conventional and constrained devices, then
the time or speed becomes less critical metric compared to key
size.
Table 7, Table 8 and Table 9 gives the results of the independent
tests on respective platforms and performance is measured (in
thousands of cycles) of the reference implementation. Results
for the median and average (in the first and second table
respectively) are rounded to the nearest 103 cycles. Signing is
performed on a message of 59 bytes.
12. Recommendations
The PQC Standardisation process is complex, arduous and
requires coordinated involvement (academia, private and public
sector) and requires significant IV&V before formalization.
Successful PQC must be resistant to both classical and quantum
attacks. Multiple tradeoffs will have to be considered such as
security, performance, key size, signature size, and side-channel
resistance countermeasures. Other important considerations
are the capability to migrate into new and existing applications
such as TLS, IKE, code signing, PKI infrastructure.
It is necessary to begin a coordinated international campaign to
mitigate the uncertainties of breakthroughs and the unknowns
regarding classified programs. The aim should include,
information sharing between the academic, public and private
sector toward the common goal.
It is critical to devise and initiate the incorporation of cutting
edge yet practical PQC to prevent a disastrous impact on global
privacy, security, and economy before the arrival of large-scale
fault-tolerant quantum computing.
13. Conclusion
qTESLA’s submission for NIST Security Categories I and III
as tested on platforms described in this work are more than two
orders of magnitude larger for the public-key for qTESLA-p-1
(128-bit security) and qTESLA-p-III (192-bit security). The
qTESLA-p-1 secret key is 56 times the size of ECDSA’s secret
key and qTESLA-p-III is two orders of magnitude larger.
It is essential to come to a consensus on how to assess quantum
security. Currently, there is not a clear agreement on the best
way to measure quantum attacks. It is, nevertheless,
fundamental that work continues with alternatives that will
produce smaller key sizes, comparable to the current ECDSA
algorithms. The major drawback with qTESLA is the large key
sizes which make it unlikely to be accepted in its current
configuration. However, there is ongoing research being done
to make it potentially a more viable candidate, both by reducing
the key sizes and providing more efficient implementations (see
tables 7, 8, 10).
The qTESLA’s “Heuristic” submission for NIST Security
Categories I and III are qTESLA-I, qTESLA-III-space, and
qTESLA-III-size. The vendor claims that their heuristic
approach is the security level of an instantiation of a scheme by
the hardness level of the instance of the underlying lattice
problem. Also, the claim is that it corresponds to these
parameters regardless of the tightness gap of the provided
security reduction if the corresponding R-LWE instance is
intractable.
These claims and the necessary proof are beyond the scope of
this work and cannot be independently verified and validated
and is not the author’s aim. It is important to note that; the
results of qTESLA’s heuristic algorithm were captured and are
analyzed against its provably secure submissions. The heuristic
algorithms were tested on the same platforms identified in the
provably secure submission. qTESLA-I’s public-key size vs.
qTESLA-p-1’s public-key size is a reduction of 90%. The
secret key size at the same bit security level is reduced by 60%,
and the signature size is reduced by 52%. Observations for
public keys; qTESLA-III-size vs. qTESLA-p-III is reduced by
92%; secret key size reduction is 66%; signature size reduction
is 56% (see Table 10).
The difference in the heuristic key sizes are dramatically
reduced and compares more favorably to ECDSA (P-256)
parameters. While the heuristic values are dramatically reduced
compared to the provably secure values, the key sizes are still
large compared to current standard ECDSA (P-256) sizes. For
Table 9: Intel® Core™ i7-2630QM CPU @ 2.00GHz × 8
Scheme Keygen Sign Verify
Total (sign +
verify) median
qTESLA-I 1729.3 494 105.7 599.7
qTESLA-III-
speed
3900.5 708.6 223.2 931.8
qTESLA-III-size 6047 1350.2 220.5 1570.7
qTESLA-p-I 6987.2 1328.2 563.8 1892
qTESLA-p-III 36254.2 5204.5 2858 8062.5
Scheme Keygen Sign Verify
Total (sign +
verify) average
qTESLA-I 1972 672 108 780
qTESLA-III-
speed
4367.9 929 224.4 1153.4
qTESLA-III-size 6994.3 1858.8 225.2 2084
qTESLA-p-I 7343 1683 5689 2252
qTESLA-p-III 3739 6430 2882 9312
Table 10: qTESLA Public-Key, Secret key, and Signature Size
Scheme (Bytes) Public-key Secret key Signature Size
qTESLA-I 1504 2112 1376
qTESLA-III-speed 3104 4160 2848
qTESLA-III-size 2976 4160 2720
qTESLA-p-I 14880 5184 2848
qTESLA-p-III 39712 12352 6176
The following results cannot be compared directly with
the vendor qTESLA’s submitted results, but; specific
observations can be made with alternative applications
and platforms. It is the author’s view that if the key
sizes are not manageable and practical for use in
conventional and constrained devices, then the time
or speed becomes less critical metric compared to key
size.
Table 7, Table 8 and Table 9 gives the results of
the independent tests on respective platforms and
performance is measured (in thousands of cycles) of
the reference implementation. Results for the median
and average (in the first and second table respectively)
are rounded to the nearest 103 cycles. Signing is
performed on a message of 59 bytes.
12. Recommendations
The PQC Standardisation process is complex, arduous
and requires coordinated involvement (academia,
private and public sector) and requires significant
IV&V before formalization. Successful PQC must
be resistant to both classical and quantum attacks.
Multiple tradeoffs will have to be considered such as
security, performance, key size, signature size, and side-
channel resistance countermeasures. Other important
considerations are the capability to migrate into new
and existing applications such as TLS, IKE, code
signing, PKI infrastructure.
It is necessary to begin a coordinated international
campaigntomitigatetheuncertaintiesof breakthroughs
and the unknowns regarding classified programs. The
aim should include, information sharing between
the academic, public and private sector toward the
common goal.
It is critical to devise and initiate the incorporation of
cutting edge yet practical PQC to prevent a disastrous
impact on global privacy, security and economy before
the arrival of large-scale fault-tolerant quantum computing.
13. Conclusion
qTESLA’s submission for NIST Security Categories I
and III as tested on platforms described in this work
are more than two orders of magnitude larger for the
public-key for qTESLA-p-1 (128-bit security) and
qTESLA-p-III (192-bit security). The qTESLA-p-1
secret key is 56 times the size of ECDSA’s secret key
and qTESLA-p-III is two orders of magnitude larger.
It is essential to come to a consensus on how to
assess quantum security. Currently, there is not a clear
agreement on the best way to measure quantum attacks.
It is, nevertheless, fundamental that work continues
with alternatives that will produce smaller key sizes,
comparable to the current ECDSA algorithms. The
major drawback with qTESLA is the large key sizes
which make it unlikely to be accepted in its current
configuration. However, there is ongoing research
being done to make it potentially a more viable
candidate, both by reducing the key sizes and providing
more efficient implementations (see tables 7, 8, 10).
The qTESLA’s “Heuristic” submission for NIST
Security Categories I and III are qTESLA-I, qTESLA-
III-space, and qTESLA-III-size. The vendor claims
that their heuristic approach is the security level of
an instantiation of a scheme by the hardness level of
the instance of the underlying lattice problem. Also,
the claim is that it corresponds to these parameters
regardless of the tightness gap of the provided security
reduction if the corresponding R-LWE instance is
intractable.
These claims and the necessary proof are beyond
the scope of this work and cannot be independently
verified and validated and is not the author’s aim. It is
importanttonotethat;theresultsof qTESLA’sheuristic
algorithm were captured and are analyzed against its
provably secure submissions. The heuristic algorithms
were tested on the same platforms identified in the
provably secure submission. qTESLA-I’s public-key
size vs. qTESLA-p-1’s public-key size is a reduction of
90%. The secret key size at the same bit security level
is reduced by 60%, and the signature size is reduced by
52%. Observations for public keys; qTESLA-III-size
vs. qTESLA-p-III is reduced by 92%; secret key size
reduction is 66%; signature size reduction is 56% (see
Table 10).
The difference in the heuristic key sizes are dramatically
reduced and compares more favorably to ECDSA
(P-256) parameters. While the heuristic values are
dramatically reduced compared to the provably secure
values, the key sizes are still large compared to current
standard ECDSA (P-256) sizes. For example; the
best result for the secret key size for qTESLA-III-
size (4160) vs. ECDSA (P-256) secret key size (96) is
a 4233% increase and would prove problematic in
24. The JBBA | Volume 2 | Issue 1 | May 2019
jbbathe
24
existing systems.
14. Future Work
The author selected qTESLA’s submission which is 1
of 5 NIST Candidate PQC digital signature schemes.
Additional work needs to be done in verifying and
validating and testing vendors results. Concrete PQC
parameters for testing and validation need to be created
for the promotion of a baseline. The parameters
should be modified to determine the best tradeoffs
while maintaining required security. Moreover, the
organization of guidelines and standards are necessary
for the wider cryptography community to aid in
PQC standardisation create efficient, high-quality
implementations.
Continued measurements of current PQC scheme
implementations should be performed, such as
performance and memory usage on the ARM and
CMOS platforms. Many embedded devices have
ARM and CMOS architecture and have limited
computational and memory resources. NIST currently
plans a Post-Quantum Cryptography Round 2 call
tentatively schedule in 2019 and will offer additional
opportunities for IV&V and research.
References
[1] S. . M, A. H. D, M. . M, P. . P and S. . Balaji,
"Decentralized digital voting application," International Journal
of Advance Research, Ideas and Innovations in Technology, vol.
4, no. 3, pp. 1725-1728, 2018
[2] E. . Feig, "A Framework for Blockchain-Based
Applications.," , 2018. [Online]. Available: http://dblp.uni-
trier.de/db/journals/corr/corr1803.html.
[Accessed 7 1 2019]
[3] D. Moody, L. Feldman and G. Witte, "Securing Tomorrow's
Information Through Post-Quantum Cryptography", Csrc.
nist.gov, 2019. [Online]. Available: https://csrc.nist.
gov/publications/detail/itl-bulletin/2018/02/securing-
information-through-post-quantum-cryptography/final.
[Accessed 7 1 2019].
[4] E. Alkim, N. Bindel, J. Buchmann, Ö. Dagdelen, E.
Eaton, G. Gutoski, J. Krämer, and F. Pawlega, “Revisiting
TESLA in the Quantum Random Oracle Model,” Post-
Quantum Cryptography Lecture Notes in Computer Science,
pp. 143–162, 2017. [Accessed 7 1 2019].
1 | 2019 Published Open Access under the CC-BY 4.0 Licence 7
ficant IV&V before formalization.
sistant to both classical and quantum
will have to be considered such as
size, signature size, and side-channel
s. Other important considerations
e into new and existing applications
ning, PKI infrastructure.
ordinated international campaign to
f breakthroughs and the unknowns
ams. The aim should include,
en the academic, public and private
goal.
nitiate the incorporation of cutting
revent a disastrous impact on global
omy before the arrival of large-scale
mputing.
secret key size at the same bit security level is reduced by 60%,
and the signature size is reduced by 52%. Observations for
public keys; qTESLA-III-size vs. qTESLA-p-III is reduced by
92%; secret key size reduction is 66%; signature size reduction
is 56% (see Table 10).
The difference in the heuristic key sizes are dramatically
reduced and compares more favorably to ECDSA (P-256)
parameters. While the heuristic values are dramatically reduced
compared to the provably secure values, the key sizes are still
large compared to current standard ECDSA (P-256) sizes. For
Table 10: qTESLA Public-Key, Secret key, and Signature Size
Scheme (Bytes) Public-key Secret key Signature Size
qTESLA-I 1504 2112 1376
qTESLA-III-speed 3104 4160 2848
qTESLA-III-size 2976 4160 2720
qTESLA-p-I 14880 5184 2848
qTESLA-p-III 39712 12352 6176
Table 10: qTESLA Public-Key, Secret key, and Signature Size
[5] G. O. Karame, "On the Security and Scalability of Bitcoin's
Blockchain," , 2016. [Online]. Available: https://dl.acm.org/
citation.cfm?id=2976756. [Accessed 7 1 2019].
[6] "Cryptocurrency Market Capitalizations," , . [Online].
Available: https://coinmarketcap.com/currencies/bitcoin-
cash/. [Accessed 8 1 2019].
[7] N. T. Courtois, G. . Song and R. . Castellucci, "Speed
Optimizations in Bitcoin Key Recovery Attacks," Tatra
mountains mathematical publications, vol. 67, no. 1, p. 103,
2016.
[8] J. Ooms, "Toolkit for Encryption, Signatures and
Certificates Based onOpenSSL," , 2016. [Online]. Available:
https://cran.r-project.org/web/packages/openssl/index.html.
[Accessed 7 1 2019].
[9] J. A. Dev, "Bitcoin mining acceleration and performance
quantification," , 2014. [Online]. Available: http://ieeexplore.
ieee.org/document/6900989. [Accessed 30 12 2018]
[10] P.-A. R. L. D. R. F. V. Fouque, "Fault Attack on
Elliptic Curve with Montgomery Ladder Implementation,"
2008
[11] "NIST Special Publications - NIST Computer Security
...," , . [Online]. Available: http://csrc.nist.gov/publications/
PubsSPs.html. [Accessed 7 1 2019].
[12] L. .Chen, S. P. Jordan, Y.-K. . Liu, D. . Moody, R.
C. Peralta, R. A. Perlner and D. C. Smith-Tone, "Report
on Post-Quantum Cryptography | NIST," , 2016. [Online].
Available: https://nist.gov/publications/report-post-quantum-
cryptography. [Accessed 30 12 2018].
[13] D. Moody, "The NIST Post-Quantum Crypto
“Competition” "The Ship Has Sailed"," in Asiacrypt 2017,
Hong Kong, 2017.
25. The JBBA | Volume 2 | Issue 1 | May 2019
jbbathe
25
27. The JBBA | Volume 2 | Issue 1 | May 2019
jbbathe
27
OPEN ACCESS
ISSN Print: 2516-3949
https://doi.org/10.31585/jbba-2-1-(2)2019
Jay Pazos
University of Chicago Booth School of Business, USA
Correspondence: jpazos@uchicago.edu
Received: 5 October 2018 Accepted: 17 January 2019 Published: 25 January 2019
Peer-reviewed Research
Valuation Method of Equity-based
Security Token Offerings
(STO) for Start-Up Companies
In this paper, we develop a novel valuation method of equity-based securities token offerings (STO) for
start-up companies. The closed-form discount rate function discovered in this paper is time-dependent and
piecewise. The first part of the function is exponential; the second part is a power function. The reason is
that, in the early years, the probability of survival of start-up firms descends more rapidly than in late years.
The probability of survival function discovered has a remarkably good fit with empirical data- for the total
of firms and ten industry sectors for which data is available. For the total of firms, we found that the highest
discount rate has a 27.0 to 31.8% range when the liquidation value of the non-surviving start-up project
is zero; this is considerably higher than observed discount rates of projects for mature firms (7.5%) but
considerably less than some published discount rates for start-up projects financed by Venture Capital firms
(40.6 to 70% range). To demonstrate the model, we work a valuation example in section six. A valuation
method for equity STOs will help to develop a more transparent market for start-ups wanting to raise
capital. Most importantly, our results show that for many start-up firms, equity STOs could be an economical
alternative to raise capital.
Abstract
Keywords: discount rate, Valuation, startup, security token, security token offering, STO, Venture Capital
JEL Classifications: D02, D71, H11, P16, P48, P50
Competing Interests:
None declared.
Ethical approval:
Not applicable.
Author’s contribution:
JP designed and coordinated
this research and prepared
the manuscript in entirety.
Funding:
None declared.
Acknowledgements:
None declared.
1. Introduction
An equity token is a new security class, initially created
with the purpose of providing early access to capital
for start-ups and growth companies. Equity tokens are
digital representations of company shares, and their
holders are collectively the owners of the company.
By definition, equity STOs are classified as securities in
mostjurisdictions;thiscertaintyof classificationisgood
for all stakeholders. One fundamental characteristic
of equity tokens is that they live in a blockchain, and
because of that, equity STOs trade in exchanges with
blockchain facilities located in jurisdictions that permit
their existence and trading.
For the valuation of companies, the DCF method
is many times preferred to others because it enables
the understanding of the dynamics of the business at
a level of detail not present in other techniques. For
the valuation of equity STOs of start-up firms using
the DCF method, we need to build a framework that
calculates the discount rate and forecasts the cash flows.
Before we forecast cash flows, we need to dimension
the opportunity facing the firm: first considering
the broadest market measure: the Total Addressable
Market (TAM), from there we narrow it down to the
Serviceable Available Market (SAM) and finally to the
Serviceable Obtainable Market, the market that the
start-up can realistically address. Later by taking into
account variables such as the growth of SOM, the
price and price growth of the provided good and the
sales growth curve profile, we can develop a forecast.
A good forecast doesn’t pose any theoretical difficulty
in its method, and it is of paramount importance
for quality valuations. The main obstacle to build a
framework for valuing start-ups using the DCF method
is to calculate the project’s discount rate. In the corpus
of financial theory, there is no explicit formula, that we
are aware of, to calculate the discount rate for start-ups,
we will dwell into this issue in section 2.
In sections 3 and 4, we will go to great lengths to
develop a discount rate formula for start-up firms. In
section 5, we will explain our views regarding how cash
28. The JBBA | Volume 2 | Issue 1 | May 2019
jbbathe
28
flows should be calculated to arrive at the valuation of
the firm. In section 6 we go through a worked example.
2. Discount Rates Variations for Start-ups
The long-standing issue about variations in discount
rates was well captured by John H. Cochrane [1] in
his August 2011 Presidential Address to the American
Finance Association, he stated in his conclusion:
“Discount rates vary a lot more than we thought. Most
of the puzzles and anomalies that we face amount to
discount-rate variations we do not understand. Our
theoretical controversies are about how discount rates
are formed. We need to recognize and incorporate
discount-rate variation in applied procedures. We are
only beginning these tasks. The facts about discount-
rate variation need at least a dramatic consolidation.
Theories are in their infancy.”
The fact that venture capitalists use high discount rates
was addressed by Sanjai Bhagat [2] in 2014. In Bhagat’s
paper summary, he explained:
“Venture capitalists typically use discount rates that
are high compared to historical rates of return on
common stock and other financial assets. Such high
discount rates also cannot be explained in the context
of any existing asset pricing theory”
In another study, Aswath Damodaran [3] mentions in
a 2009 paper that Venture Capital firms have typical
target rates of return of 50-70% for start-ups and
suggests that these target rates must have incorporated
some survival risks, Damodoran says:
“How do we know that these rates of return have survival risks
built into them? In addition to the intuitive rationale that they
decrease as firms move through the life cycle and the chance of
failure drops, the actual returns by the venture capitalists at every
stage of the process are much more modest...”
Although Damodaran’s doesn’t offer any formula
to quantify his intuition, we believe that he steers inThe JBBA | Volume 2 | Issue 1 | 2019 Published Open Access under the CC-BY 4.0 Licence 2
Figure 1: Map of valuation model.
2. Discount Rates Variations for Start-ups
The long-standing issue about variations in discount rates was
well captured by John H. Cochrane [1] in his August 2011
Presidential Address to the American Finance Association, he
stated in his conclusion:
“Discount rates vary a lot more than we thought. Most of the
puzzles and anomalies that we face amount to discount-rate
variations we do not understand. Our theoretical controversies
are about how discount rates are formed. We need to recognize
and incorporate discount-rate variation in applied procedures.
We are only beginning these tasks. The facts about discount-
rate variation need at least a dramatic consolidation. Theories
are in their infancy.”
The fact that venture capitalists use high discount rates was
addressed by Sanjai Bhagat [2] in 2014. In Bhagat’s paper
summary, he explained:
“Venture capitalists typically use discount rates that are high
compared to historical rates of return on common stock and
other financial assets. Such high discount rates also cannot be
explained in the context of any existing asset pricing theory”
In another study, Aswath Damodaran [3] mentions in a 2009
paper that Venture Capital firms have typical target rates of
return of 50-70% for start-ups and suggests that these target
rates must have incorporated some survival risks, Damodoran
says:
“How do we know that these rates of return have survival risks
built into them? In addition to the intuitive rationale that they
decrease as firms move through the life cycle and the chance of
failure drops, the actual returns by the venture capitalists at
every stage of the process are much more modest...”
Although Damodaran’s doesn’t offer any formula to quantify
his intuition, we believe that he steers in the right direction. The
probability of survival is a determinant of the formula of
discount rates for start-ups as it will be shown in the next
sections.
In this paper, we pose the hypothesis that we have found a
novel closed-form expression of the discount rate to value start-
up companies. In a quest to falsify our hypothesis, we have
made extensive use of Google Scholar to search in past
literature for any previous formula that calculates the discount
rate for start-ups, and we have found none. This doesn’t mean
that our hypothesis is correct, it only means that, until today,
we have not been able to falsify our hypothesis. However,
others may in the future.
3. Using historical data to determine the probability of
survival function
Our objective in this section is to look at historical data and
determine if we can find a probability of survival function that
describes well the empirical data.
In this manuscript, we use empirical data from the Knaup and
Piazza [4] (K&P) study that presented data over a 7-year period.
The K&P study examined a cohort of establishments from the
Bureau of Labor Statistics (BLS) Quarterly Census of
Employment and Wages (QCEW) program.
We believe that the (K&P) study data is an excellent starting
point to determine the probability survival function, some
important characteristics of the study data are related to the
comprehensiveness of the QCEW program. As presented in the
K&P study, they are as follows:
• At the time the K&P study was performed, the QCEW
program contained information on 8.9 million U.S. business
establishments in both the public and private sector
• The monthly business establishment data is compiled on a
quarterly basis for State unemployment insurance tax
purposes and are edited and submitted to the BLS.
• The QCEW program collects information covering
approximately 98 percent of non-farm payroll employment
in the United States.
• The data generated by the QCEW program serve as the
sampling frame for a range of BLS establishment surveys and
as a benchmark for the Current Employment Statistics survey
• Outside researchers use QCEW microdata to investigate
topics in the field of labor economics, and such data are the
largest single input to the Bureau of Economic Analysis
personal income accounting program. QCEW program data
also are used to generate gross job flows in the Business
Employment Dynamics (BED) data series.
• The QCEW program has linked data from the first quarter
of 1990 through the most current quarter; the data usually are
available seven months after the end of the reference quarter.
The coverage and frequency of the data are unique in the
Figure 1: Map of valuation model.
the right direction. The probability of survival is a
determinant of the formula of discount rates for start-
ups as it will be shown in the next sections.
In this paper, we pose the hypothesis that we have
found a novel closed-form expression of the discount
rate to value start-up companies. In a quest to falsify
our hypothesis, we have made extensive use of Google
Scholar to search in past literature for any previous
formula that calculates the discount rate for start-ups,
and we have found none. This doesn’t mean that our
hypothesis is correct, it only means that, until today, we
have not been able to falsify our hypothesis. However,
others may in the future.
3.Usinghistoricaldatatodeterminetheprobability
of survival function
Our objective in this section is to look at historical data
and determine if we can find a probability of survival
function that describes well the empirical data.
In this manuscript, we use empirical data from the
Knaup and Piazza [4] (K&P) study that presented
data over a 7-year period. The K&P study examined
a cohort of establishments from the Bureau of Labor
Statistics (BLS) Quarterly Census of Employment and
Wages (QCEW) program.
We believe that the (K&P) study data is an excellent
starting point to determine the probability survival
function, some important characteristics of the study
data are related to the comprehensiveness of the
QCEW program. As presented in the K&P study, they
are as follows:
• At the time the K&P study was performed,
the QCEW program contained information
on 8.9 million U.S. business establishments
in both the public and private sector
• The monthly business establishment data
is compiled on a quarterly basis for State
unemployment insurance tax purposes and
are edited and submitted to the BLS.
• The QCEW program collects information
covering approximately 98 percent of non-
farm payroll employment in the United States.
• The data generated by the QCEW program
serve as the sampling frame for a range
of BLS establishment surveys and as a
benchmark for the Current Employment
Statistics survey
• Outside researchers use QCEW microdata
to investigate topics in the field of labor
economics, and such data are the largest
single input to the Bureau of Economic
Analysis personal income accounting
program. QCEW program data also are used
to generate gross job flows in the Business
Employment Dynamics (BED) data series.
29. The JBBA | Volume 2 | Issue 1 | May 2019
jbbathe
29
• The QCEW program has linked data from
the first quarter of 1990 through the most
current quarter; the data usually are available
seven months after the end of the reference
quarter. The coverage and frequency of the
data are unique in the Federal statistical
systemin that they allow the tracking of the
start-up, growth, and failure of a particular
establishment concurrently with the timing
of those events.
The (K&P) study follows a selected cohort of
establishments from birth through 28 quarters of their
lifetime, from March 1998 to March 2005, creating the
basis for the 7-year survival study. The cohort data for
the companies studied is in our opinion robust, and
as presented in the K&P study, it has the following
characteristics:
• Company births are defined as those
establishments which are new in the
reference quarter and show no positive
employment for the previous four quarters
• Each microdata record is tested for four
quarters before the reference quarter, to
prevent seasonal establishments from
appearing in the birth cohort.
• New establishments have no ties to any
establishments that existed before the
reference quarter. This approach eliminates
changes in ownership from the cohort,
as well as new locations of existing firms,
which might be expected to behave
differently from independent establishments.
• Another reason for not including new
locations of existing firms is that they often
represent administrative changes in the
data rather than actual new locations.
To include them would have risked skewing
the data in terms of both survival analysis
and average employment.
• The study tracked the original 212,182 new
establishments across the US for the second
quarter of 1998 (beginning in March
of that year). The cohort accounts for
approximately all births during that quarter, a
typical quarter from 1992 to the end of the
series.
• In the birth quarter, establishments
are equivalent to firms. In subsequent
quarters, establishments may be acquired
by or merged with another firm, spin off a
subsidiary, or open additional locations.
• Establishments that were involved in
such succession relationships also were
tracked across time, by following the
successor establishments. Data on these
successors were aggregated and assigned
a unique identifier that was linked to the
original birth establishment.
The resulting survival rates from the K&P study are
summarized in Table 1.
One salient point present in each of the industry sector
series is that the survival rates descend at a decreasing
rate. The descent is high in the early years and low in
the later years. In this paper, we propose the hypothesis
that there is an exponential function relationship in the
early years and a power function relationship in the late
years. The reason for this is to accommodate for the
difference in descent rates between early and late years.
First, we need some definitions:
• Let Ps
(t) be the probability of survival of
the firm at time = t;
• Let Ps
(0) be the probability of survival of
the firm at time = 0;
• Let t be the number of years from the date
of incorporation of the firm;
• Let C and α be some constants in the power
function;
• Let λ be some constant in the exponential
function;
The JBBA | Volume 2 | Issue 1 | 2019 Published Open Access under the CC-BY 4.0 Licence
Federal statistical system in that they allow the tracking of the
start-up, growth, and failure of a particular establishment
concurrently with the timing of those events.
The (K&P) study follows a selected cohort of establishments
from birth through 28 quarters of their lifetime, from March
1998 to March 2005, creating the basis for the 7-year survival
study. The cohort data for the companies studied is in our
opinion robust, and as presented in the K&P study, it has the
following characteristics:
• Company births are defined as those establishments which
are new in the reference quarter and show no positive
employment for the previous four quarters
• Each microdata record is tested for four quarters before the
reference quarter, to prevent seasonal establishments from
appearing in the birth cohort.
• New establishments have no ties to any establishments that
existed before the reference quarter. This approach
eliminates changes in ownership from the cohort, as well as
new locations of existing firms, which might be expected to
behave differently from independent establishments.
• Another reason for not including new locations of existing
firms is that they often represent administrative changes in
the data rather than actual new locations. To include them
would have risked skewing the data in terms of both survival
analysis and average employment.
• The study tracked the original 212,182 new establishments
across the US for the second quarter of 1998 (beginning in
March of that year). The cohort accounts for approximately
all births during that quarter, a typical quarter from 1992 to
the end of the series.
• In the birth quarter, establishments are equivalent to firms.
In subsequent quarters, establishments may be acquired by or
merged with another firm, spin off a subsidiary, or open
additional locations.
• Establishments that were involved in such success
relationships also were tracked across time, by following
successor establishments. Data on these successors w
aggregated and assigned a unique identifier that was linke
the original birth establishment.
The resulting survival rates from the K&P study are
summarized in table 1.
One salient point present in each of the industry sector serie
that the survival rates descend at a decreasing rate. The desc
is high in the early years and low in the later years. In this pa
we propose the hypothesis that there is an exponential funct
relationship in the early years and a power function relations
in the late years. The reason for this is to accommodate for
difference in descent rates between early and late years. F
we need some definitions:
• Let Ps(t) be the probability of survival of the firm at time
• Let Ps(0) be the probability of survival of the firm at tim
0
• Let t be the number of years from the date of incorporat
of the firm
• Let C and α be some constants in the power function
• Let λ be some constant in the exponential function
• Let a be the transition point in time when the probabilit
survival function Ps(t) changes from exponential to po
characteristics
The proposed exponential equation for the early years has
form: 𝑃𝑃𝑃𝑃𝑠𝑠𝑠𝑠(𝑡𝑡𝑡𝑡) = 𝑃𝑃𝑃𝑃𝑠𝑠𝑠𝑠(0) ⋅ 𝑒𝑒𝑒𝑒−λ⋅𝑡𝑡𝑡𝑡
and the proposed power funct
for the late years has the form: 𝑃𝑃𝑃𝑃𝑠𝑠𝑠𝑠(𝑡𝑡𝑡𝑡) = C ⋅ 𝑡𝑡𝑡𝑡−α
. The piecew
function expressing the probability of survival looks as follo
Table 1: Survival rates from the year of incorporation- US companies 1998-2005 period. (Source: Knaup
& Piazza [4] and Aswath Damodaran [5])
Survival Rates from year of Incorporation
Industry sector Incorporation year 1 year 2 year 3 year 4 year 5 year 6 year 7
Natural Resources and Mining 100% 82.33% 69.54% 59.41% 49.56% 43.43% 39.96% 36.68%
Construction 100% 80.69% 65.73% 53.56% 42.59% 36.96% 33.36% 29.96%
Manufacturing 100% 84.19% 68.67% 56.98% 47.41% 40.88% 37.03% 33.91%
Trade, Transportation and Utilities 100% 82.58% 66.82% 54.70% 44.68% 38.21% 34.12% 31.02%
Information 100% 80.75% 62.85% 49.49% 37.70% 31.24% 28.29% 24.78%
Financial Activities 100% 84.09% 69.57% 58.56% 49.24% 43.93% 40.34% 36.90%
Professional and Business Services 100% 82.32% 66.82% 55.13% 44.28% 38.11% 34.46% 31.08%
Education and Health Services 100% 85.59% 72.83% 63.73% 55.37% 50.09% 46.47% 43.71%
Leisure and Hospitality 100% 81.15% 64.99% 53.61% 43.76% 38.11% 34.54% 31.40%
Other Services 100% 80.72% 64.81% 53.32% 43.88% 37.05% 32.33% 28.77%
Total for all firms 100% 81.24% 65.77% 54.29% 44.36% 38.29% 34.44% 31.18%
Table 1: Survival rates from the year of incorporation- US companies 1998-2005 period.
(Source: Knaup & Piazza [4] and Aswath Damodaran [5])
Survival Rates from year of Incorporation