An ECSDA-based Security Approach on Blockchain for Cryptocurrency-based Online Transactions
Abstract
Full Text:
PDFReferences
Vanstone, S. (1992). Responses to NIST’s proposal. Communications of the ACM, 35(7), 50-52.
Vanstone, S. A. (2003). Next generation security for wireless: elliptic curve cryptography. Computers & Security, 22(5), 412-415.
Koblitz, N., & Cryptosystems, E. C. (1987). Mathematics of Computation, vol. 48.
Miller, V. S. (1985, August). Use of elliptic curves in cryptography. In Conference on the theory and application of cryptographic techniques (pp. 417-426). Springer, Berlin, Heidelberg.
Hankerson, D., Menezes, A. J., & Vanstone, S. (2005). Guide to elliptic curve cryptography. Computing Reviews, 46(1), 13.
Bos, J. W., Halderman, J. A., Heninger, N., Moore, J., Naehrig, M., & Wustrow, E. (2014, March). Elliptic curve cryptography in practice. In International Conference on Financial Cryptography and Data Security (pp. 157-175). Springer, Berlin, Heidelberg.
Evans, J. (2014). Bitcoin 2.0: Sidechains and ethereum and zerocash. In Oh my!.
Gentry, C. (2009, May). Fully homomorphic encryption using ideal lattices. In Proceedings of the forty-first annual ACM symposium on Theory of computing (pp. 169-178).
Barlow, J. P. (2019). A Declaration of the Independence of Cyberspace. Duke Law & Technology Review, 18(1), 5-7.
Foil Arms and Hog, “WTF is Brexit? - Foil Arms and Hog - YouTube,” YouTube, pp. 1–9, 2016.
Refbacks
- There are currently no refbacks.