2016-02-04 11:08:22 +00:00
|
|
|
|
\bibitem[BBJLP]{BBJLP} Bernstein, Daniel J., et al. "Twisted
|
|
|
|
|
edwards curves." Progress in Cryptology\textendash{}AFRICACRYPT
|
|
|
|
|
2008. Springer Berlin Heidelberg, 2008. 389-405.
|
|
|
|
|
|
|
|
|
|
\bibitem[BCPM]{BCPM} Bos, Joppe W., et al. "Selecting
|
|
|
|
|
Elliptic Curves for Cryptography: An Efficiency and Security Analysis."
|
|
|
|
|
IACR Cryptology ePrint Archive 2014 (2014): 130.
|
|
|
|
|
|
|
|
|
|
\bibitem[Bern]{Bern} Bernstein, Daniel J. "Curve25519:
|
|
|
|
|
new Diffie-Hellman speed records." Public Key Cryptography-PKC
|
|
|
|
|
2006. Springer Berlin Heidelberg, 2006. 207-228.
|
|
|
|
|
|
|
|
|
|
\bibitem[CH]{CH} Chaum, David, and Eugene Van Heyst. "Group
|
|
|
|
|
signatures." Advances in Cryptology\textemdash{}EUROCRYPT\textquoteright{}91.
|
|
|
|
|
Springer Berlin Heidelberg, 1991.
|
|
|
|
|
|
|
|
|
|
\bibitem[CN]{CN} van Saberhagen, Nicolas. "CryptoNote
|
|
|
|
|
v 2.0." (2013).
|
|
|
|
|
|
|
|
|
|
\bibitem[FIPS]{FIPS} SHA, NIST DRAFT. "standard: Permutation-based
|
|
|
|
|
hash and extendable-output functions." DRAFT FIPS 202
|
|
|
|
|
(2014).
|
|
|
|
|
|
|
|
|
|
\bibitem[Fu]{Fu} Fujisaki, Eiichiro. "Sub-linear size
|
|
|
|
|
traceable ring signatures without random oracles." IEICE
|
|
|
|
|
TRANSACTIONS on Fundamentals of Electronics, Communications and Computer
|
|
|
|
|
Sciences 95.1 (2012): 151-166.
|
|
|
|
|
|
|
|
|
|
\bibitem[FS]{FS} Fujisaki, Eiichiro, and Koutarou Suzuki. "Traceable
|
|
|
|
|
ring signature." Public Key Cryptography\textendash{}PKC
|
|
|
|
|
2007. Springer Berlin Heidelberg, 2007. 181-200.
|
|
|
|
|
|
|
|
|
|
\bibitem[IAN]{IAN} IANIX http://ianix.com/pub/curve25519-deployment.html
|
|
|
|
|
|
|
|
|
|
\bibitem[Si]{Si} Silverman, Joseph H. The arithmetic of elliptic
|
|
|
|
|
curves. Vol. 106. Dordrecht: Springer, 2009.
|
|
|
|
|
|
|
|
|
|
\bibitem[SN]{SN} http://lab.monero.cc/pubs/multiple\_equations\_attack.pdf
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
@misc{saturationUTXO,
|
|
|
|
|
author = {Tacotime},
|
|
|
|
|
title = {Saturation of Unspent Transaction Outputs},
|
|
|
|
|
month = {September},
|
|
|
|
|
year = {2014},
|
|
|
|
|
url = {https://bitcointalk.org/index.php?topic=789978.msg8904862#msg8904862}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@misc{visaTPS,
|
|
|
|
|
author={Manny Trillo},
|
|
|
|
|
title={Stress Test Prepares VisaNet for the Most Wonderful Time of the Year},
|
|
|
|
|
month={October},
|
|
|
|
|
year={2013},
|
|
|
|
|
url={http://www.visa.com/blogarchives/us/2013/10/10/stress-test-prepares-visanet-for-the-most-wonderful-time-of-the-year/index.html}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@article{nakamoto2008bitcoin,
|
|
|
|
|
title={Bitcoin: A peer-to-peer electronic cash system},
|
|
|
|
|
author={Nakamoto, Satoshi}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@article{massey1996estimating,
|
|
|
|
|
title={Estimating the parameters of a nonhomogeneous Poisson process with linear rate},
|
|
|
|
|
author={Massey, William A and Parker, Geraldine A and Whitt, Ward},
|
|
|
|
|
journal={Telecommunication Systems},
|
|
|
|
|
volume={5},
|
|
|
|
|
number={2},
|
|
|
|
|
pages={361--388},
|
|
|
|
|
year={1996},
|
|
|
|
|
publisher={Springer}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@inproceedings{decker2013information,
|
|
|
|
|
title={Information propagation in the bitcoin network},
|
|
|
|
|
author={Decker, Christian and Wattenhofer, Roger},
|
|
|
|
|
booktitle={Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on},
|
|
|
|
|
pages={1--10},
|
|
|
|
|
year={2013},
|
|
|
|
|
organization={IEEE}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
% Verified
|
|
|
|
|
@techreport{chainReactions,
|
|
|
|
|
title={MRL-0001: A Note on Chain Reactions in Traceability in CryptoNote 2.0},
|
|
|
|
|
author={Noether, Surae and Noether, Sarang and Mackenzie, Adam}
|
|
|
|
|
institution = {Monero Research Lab},
|
|
|
|
|
type = {paper}
|
|
|
|
|
number = {0001},
|
|
|
|
|
year = {2014},
|
|
|
|
|
month = {September}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@techreport{block202612,
|
|
|
|
|
title={Counterfeiting via Merkle Tree Exploits within Virtual Currencies Employing the CryptoNote Protocol},
|
|
|
|
|
author={Macheta, Jan and Noether, Surae and Noether, Sarang and Smooth, Javier}
|
|
|
|
|
institution = {Monero Research Lab},
|
|
|
|
|
type = {paper}
|
|
|
|
|
number = {0002},
|
|
|
|
|
year = {2014},
|
|
|
|
|
month = {September}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@techreport{moneroNotMysterious,
|
|
|
|
|
title={Monero is Not That Mysterious},
|
|
|
|
|
author={Noether, Shen}
|
|
|
|
|
institution = {Monero Research Lab},
|
|
|
|
|
type = {paper}
|
|
|
|
|
number = {0003},
|
|
|
|
|
year = {2014},
|
|
|
|
|
month = {September}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@techreport{sdcWhitePaper,
|
|
|
|
|
title={ShadowCash: Zeroknowledge Anonymous Distributed ECash
|
|
|
|
|
via Traceable Ring Signatures},
|
|
|
|
|
author={Rynomster and Tecnovert}
|
|
|
|
|
institution = {ShadowCash},
|
|
|
|
|
type = {paper}
|
|
|
|
|
number = {0001},
|
|
|
|
|
year = {2014}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
@incollection{rivest2001leak,
|
|
|
|
|
title={How to leak a secret},
|
|
|
|
|
author={Rivest, Ronald L and Shamir, Adi and Tauman, Yael},
|
|
|
|
|
booktitle={Advances in Cryptology-ASIACRYPT 2001},
|
|
|
|
|
pages={552--565},
|
|
|
|
|
year={2001},
|
|
|
|
|
publisher={Springer}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@book{johnson1977urn,
|
|
|
|
|
title={Urn models and their application: an approach to modern discrete probability theory},
|
|
|
|
|
author={Johnson, Norman Lloyd and Kotz, Samuel},
|
|
|
|
|
year={1977},
|
|
|
|
|
publisher={Wiley New York}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@article{klamkin1967extensions,
|
|
|
|
|
title={Extensions of the birthday surprise},
|
|
|
|
|
author={Klamkin, MS and Newman, DJ},
|
|
|
|
|
journal={Journal of Combinatorial Theory},
|
|
|
|
|
volume={3},
|
|
|
|
|
number={3},
|
|
|
|
|
pages={279--282},
|
|
|
|
|
year={1967},
|
|
|
|
|
publisher={Elsevier}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@inproceedings{miers2013zerocoin,
|
|
|
|
|
title={Zerocoin: Anonymous distributed e-cash from bitcoin},
|
|
|
|
|
author={Miers, Ian and Garman, Christina and Green, Matthew and Rubin, Aviel D},
|
|
|
|
|
booktitle={Security and Privacy (SP), 2013 IEEE Symposium on},
|
|
|
|
|
pages={397--411},
|
|
|
|
|
year={2013},
|
|
|
|
|
organization={IEEE}
|
|
|
|
|
}
|