Login / Signup
Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency.
Ethan Heilman
Neha Narula
Garrett Tanzer
James Lovejoy
Michael Colavita
Madars Virza
Tadge Dryja
Published in:
IACR Cryptol. ePrint Arch. (2019)
Keyphrases
</>
block cipher
vector field
countermeasures
attack detection
watermarking scheme
traffic analysis
secret key
detecting malicious
malicious attacks
security mechanisms
scatter search
s box
security protocols
data publishing
gradient field
database
evolutionary algorithm
website
genetic algorithm