Subject
General Computer Science,Theoretical Computer Science
Reference225 articles.
1. S. Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, Working Paper, 2008, https://bitcoin.org/bitcoin.pdf.
2. The elliptic curve digital signature algorithm (ECDSA);Johnson;Int. J. Inf. Sec.,2001
3. D. Boneh, M. Drijvers, G. Neven, Compact Multi-signatures for Smaller Blockchains, in: Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II, 2018, pp. 435–464.
4. J. Coron, Y. Dodis, C. Malinaud, P. Puniya, Merkle-Damgård Revisited: How to Construct a Hash Function, in: Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, 2005, pp. 430–448.
5. J. Bonneau, A. Miller, J. Clark, A. Narayanan, J.A. Kroll, E.W. Felten, SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies, in: 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015, 2015, pp. 104–121.
Cited by
40 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献