Publisher
Springer Nature Switzerland
Reference23 articles.
1. Alkeilani Alkadri, N., et al.: Deterministic wallets in a quantum world. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 1017–1031 (2020)
2. Lecture Notes in Computer Science;E Alkim,2020
3. Applebaum, B., Ishai, Y., Kushilevitz, E.: Cryptography with constant input locality. J. Cryptol. 22(4), 429–469 (2009)
4. Berlekamp, E., McEliece, R., Van Tilborg, H.: On the inherent intractability of certain coding problems (corresp.). IEEE Trans. Inf. Theory 24(3), 384–386 (1978)
5. BLOOMBERG: “How to Steal \$500 Million in Cryptocurrency”. http://fortune.com/2018/01/31/coincheck-hack-how/