Author:
Chaum David,Larangeira Mario,Yaksetig Mario
Publisher
Springer International Publishing
Reference25 articles.
1. Aranha, D. F., Novaes, F. R., Takahashi, A., Tibouchi, M., & Yarom, Y. (2020). Ladderleak: Breaking ecdsa with less than one bit of nonce leakage. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (pp. 225–242). New York, NY, USA: CCS ’20, Association for Computing Machinery.
2. Badertscher, C., Gazi, P., Kiayias, A., Russell, A., & Zikas, V. (2018). Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability. In D. Lie, M. Mannan, M. Backes, & X. Wang (Eds.), ACM CCS (pp. 913–930). ACM Press. https://doi.org/10.1145/3243734.3243848.
3. Bernstein, D. J., Hülsing, A., Kölbl, S., Niederhagen, R., Rijneveld, J., & Schwabe, P. (2019). The SPHINCS$$^+$$ signature framework. In L. Cavallaro, J. Kinder, X. Wang, & J. Katz (Eds.), ACM CCS (pp. 2129–2146). ACM Press. https://doi.org/10.1145/3319535.3363229.
4. Mnemonic code for generating deterministic keys. Accessed September 10, 2021, from https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki.
5. Mnemonic code converter. Accessed September 10, 2021, from https://iancoleman.io/bip39/.