On Bitcoin Security in the Presence of Broken Cryptographic Primitives.
Ilias GiechaskielCas CremersKasper Bonne RasmussenPublished in: ESORICS (2) (2016)
Keyphrases
- security properties
- security protocols
- key management
- smart card
- encryption scheme
- security requirements
- information security
- fuzzy vault
- encryption decryption
- security analysis
- random number generator
- encryption key
- cryptographic algorithms
- secure communication
- access control
- cryptographic protocols
- network security
- digital signature
- security issues
- high assurance
- elliptic curve cryptography
- stream cipher
- trusted third party
- building blocks
- security services
- intrusion detection
- security mechanisms
- high level
- data security
- high security
- sensitive data
- security policies
- statistical databases
- security systems
- information systems
- ad hoc networks
- resource constrained
- low level