Karame, G.O., Androulaki, E., Capkun, S.: In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 906–917. ACM (2012)
Karame, G.O., Androulaki, E., Roeschlin, M., Gervais, A., Čapkun, S.: Misbehavior in Bitcoin: a study of double-spending and accountability. ACM Trans. Inf. Syst. Secur. 18(1), 21 (2015). https://doi.org/10.1145/2732196
Article
Google Scholar
GAP600: Gap600 bitcoin transactions guaranteed. http://gap600.com/ (2017). Accessed 12 Nov 2018
Bamert, T., Decker, C., Elsen, L., Wattenhofer, R., Welten, S.: In: Proceedings of the IEEE International Conference on Peer-to-Peer Computing (P2P). Trento (2013)
Biryukov, A., Khovratovich, D., Pustogarov, I.: In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 15–29. ACM (2014)
Biryukov, A., Pustogarov, I.: Security and Privacy (SP), 2015 IEEE Symposium on, pp. 122–134. IEEE (2015)
Kroll, J.A., Davey, I.C., Felten, E.W.: In: The Twelfth Workshop on the Economics of Information Security (WEIS, 2013) (2013)
Bentov, I., Kumaresan, R.: In: International Cryptology Conference, pp. 421–439. Springer (2014)
Poon, J., Dryja, T.: The Bitcoin Lightning Network: Scalable Off-chain Instant Payments. Technical Reports. https://lightning.network (2015). Accessed 12 Nov 2018
Bentov, I., Kumaresan, R., Miller, A.: In: Theory and Application of Cryptology and Information Security, pp. 410–440. Springer (2017)
David, B., Dowsley, R., Larangeira, M.: In: Proceedings of the 2018 International Conference on Financial Cryptography and Data Security (2018)
Park, S., Kwon, A., Fuchsbauer, G., Gazi, P., Alwen, J., Pietrzak, K.: In: Proceedings of the 2018 International Conference on Financial Cryptography and Data Security (2018)
Ruffing, T., Kate, A., Schröder, D.: In: Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, CCS ’15, pp. 219–230. ACM (2015)
Antonopoulos, A.M.: In: Mastering Bitcoin: Unlocking Digital Cryptocurrencies, Chap. 5. O’Reilly Media, Inc. (2014)
Certicom Research: Sec 2: Recommended Elliptic Curve Domain Parameters. Technical Reports, Certicom Corp (2010)
Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
MATH
Google Scholar
Paar, C., Pelzl, J.: Understanding Cryptography: A Textbook for Students and Practitioners. Springer, Berlin (2009)
MATH
Google Scholar
Nguyen, P.Q., Shparlinski, I.E.: The insecurity of the digital signature algorithm with partially known nonces. J. Cryptol. 15(3), 151 (2002)
MathSciNet
Article
MATH
Google Scholar
Bellare, M., Goldwasser, S., Micciancio, D.: In: Annual International Cryptology Conference, pp. 277–291. Springer (1997)
Schneider, N.: Recovering Bitcoin private keys using weak signatures from the blockchain. Retrieved from https://web.archive.org/web/20180201164531/
http://www.nilsschneider.net/2013/01/28/recovering-bitcoin-private-keys.html (2013)
Valsorda, F.: Exploiting ECDSA failures in the Bitcoin blockchain (2014). http://conference.hitb.org/hitbsecconf2014kul/materials/D1T1%20-%20Filippo%20Valsorda%20-%20Exploiting%20ECDSA%20Failures%20in%20the%20Bitcoin%20Blockchain.pdf
Bitcoin.org.: Android security vulnerability. https://bitcoin.org/en/alert/2013-08-11-android (2013). Accessed 12 Nov 2018
Pornin, T.: Deterministic usage of the digital signature algorithm (DSA) and elliptic curve digital signature algorithm (ECDSA). In: RFC 6979, Internet Request for Comments, The Internet Society (2013)
Clark, J., Essex, A.: In: Keromytis A.D. (eds) Financial Cryptography and Data Security, Lecture Notes in Computer Science, vol. 7397, pp. 390–398. Springer, Berlin (2012). https://doi.org/10.1007/978-3-642-32946-3_28
Decker, C.: Data propagation: How fast does information move in the network? http://bitcoinstats.com/network/propagation/ (2017). Accessed 12 Nov 2018