research-lab/publications/research-bulletins/MRL-0002 - Counterfeiting via Merkle Tree Exploits within Virtual Currencies Employing the CryptoNote Protocol/biblio.bib

30 lines
885 B
BibTeX
Raw Normal View History

2016-02-23 07:26:04 +00:00
@inproceedings{merkle1988digital,
title={A digital signature based on a conventional encryption function},
author={Merkle, Ralph C},
booktitle={Advances in Cryptology—CRYPTO87},
pages={369--378},
year={1988},
organization={Springer}
}
@article{anderson1993classification,
title={The classification of hash functions},
author={Anderson, Ross},
year={1993},
publisher={Citeseer}
}
@book{viega2003secure,
title={Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation \& More},
author={Viega, John and Messier, Matt},
year={2003},
publisher={O'Reilly Media, Inc.}
}
@manual{CryptoNote:2014,
title = "Monero Network Exploit Post-Mortem",
author = "Werner Albert",
note = "\url{https://forum.cryptonote.org/viewtopic.php?f=7&t=270}",
year = "2014 (accessed Sept 15, 2014)"
2017-06-14 23:22:01 +00:00
}