Search:
Match:
4 results
Research#Blockchain🔬 ResearchAnalyzed: Jan 10, 2026 09:50

Sedna: A Scalable Approach to Blockchain Transaction Processing

Published:Dec 18, 2025 20:12
1 min read
ArXiv

Analysis

This research paper proposes a novel sharding technique, Sedna, for improving the scalability of blockchain transactions. The concept of utilizing multiple concurrent proposer blockchains is an interesting approach to address throughput limitations.
Reference

The paper focuses on sharding transactions in multiple concurrent proposer blockchains.

Research#Blockchain🔬 ResearchAnalyzed: Jan 10, 2026 11:01

SEDULity: Advancing Secure Blockchains with Proof-of-Learning

Published:Dec 15, 2025 18:55
1 min read
ArXiv

Analysis

This research explores a novel framework called SEDULity for enhancing the security and efficiency of blockchain technology. The paper's focus on 'proof-of-learning' suggests a potentially innovative approach to consensus mechanisms and incentivization within distributed systems.
Reference

SEDULity is a proof-of-learning framework.

Research#Blockchain🔬 ResearchAnalyzed: Jan 10, 2026 11:09

Quantum Threat to Blockchain: A Security and Performance Analysis

Published:Dec 15, 2025 13:48
1 min read
ArXiv

Analysis

This ArXiv paper likely explores the vulnerabilities of blockchain technology to attacks from quantum computers, analyzing how quantum computing could compromise existing cryptographic methods used in blockchains. The study probably also assesses the performance impact of implementing post-quantum cryptographic solutions.
Reference

The paper focuses on how post-quantum attackers reshape blockchain security and performance.

Research#Blockchain🔬 ResearchAnalyzed: Jan 10, 2026 11:11

Security Analysis of Blockchain Applications and Consensus Protocols

Published:Dec 15, 2025 11:26
1 min read
ArXiv

Analysis

This ArXiv article provides a broad overview of security challenges within various blockchain implementations and consensus mechanisms. It's likely a survey or literature review, important for researchers but potentially lacking specific technical contributions.
Reference

The article covers topics like selfish mining, undercutting attacks, DAG-based blockchains, e-voting, cryptocurrency wallets, secure-logging, and CBDC.