Bitcoin Security with Post Quantum Cryptography.
Meryem Cherkaoui SemmouniAbderrahmane NitajMostafa BelkasmiPublished in: NETYS (2019)
Keyphrases
- information security
- encryption algorithms
- network security
- security issues
- security requirements
- computer security
- information systems
- cellular automata
- cryptographic algorithms
- elliptic curve cryptography
- access control
- security level
- security properties
- public key cryptography
- trusted third party
- security policies
- sensitive data
- security systems
- statistical databases
- smart card
- intrusion detection
- security mechanisms
- key management
- security analysis
- key distribution
- high security