\chapter{Θεωρητικό υπόβαθρο}\label{chapter:2-theoretical-background} \input{chapters/2.theoretical-background/2.1.hash-functions} \input{chapters/2.theoretical-background/2.2.asymmetric-cryptography} \input{chapters/2.theoretical-background/2.3.merkle-trees} \input{chapters/2.theoretical-background/2.4.p2p-networks} \input{chapters/2.theoretical-background/2.5.blockchain} \input{chapters/2.theoretical-background/2.6.ethereum} \input{chapters/2.theoretical-background/2.7.ipfs}