1. Litke, P., Stewart, J.: Cryptocurrency-stealing malware landscape (2014) (retrieved March 2014)
2. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008),
http://bitcoin.org/bitcoin.pdf
(retrieved March 2014)
3. Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: Peer-to-Peer Computing (P2P) (2013)
4. Standards for Efficient Cryptography (SEC): SEC 2: Recommended elliptic curve domain parameters. Technical report, Certicom Research (2000)
5. Jonathan Fildes: PS3 ECDSA security failure,
http://www.bbc.co.uk/news/technology-12116051
(retrieved March 2014)