Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency.
Ethan HeilmanNeha NarulaGarrett TanzerJames LovejoyMichael ColavitaMadars VirzaTadge DryjaPublished in: IACR Trans. Symmetric Cryptol. (2020)
Keyphrases
- block cipher
- countermeasures
- vector field
- attack detection
- malicious attacks
- chosen plaintext
- watermarking scheme
- computer security
- secret key
- s box
- hash functions
- traffic analysis
- security threats
- data corruption
- secure routing
- ddos attacks
- terrorist attacks
- security risks
- java card
- database
- digital watermarking
- security protocols
- security mechanisms
- intrusion detection system
- multiscale
- information systems