added MRL4

This commit is contained in:
Riccardo Spagni 2016-02-04 13:08:22 +02:00
parent 979f2fa0c4
commit 9203e87e08
No known key found for this signature in database
GPG key ID: 55432DF31CCD4FCD
2 changed files with 1180 additions and 0 deletions

View file

@ -0,0 +1,158 @@
\bibitem[BBJLP]{BBJLP} Bernstein, Daniel J., et al. "Twisted
edwards curves." Progress in Cryptology\textendash{}AFRICACRYPT
2008. Springer Berlin Heidelberg, 2008. 389-405.
\bibitem[BCPM]{BCPM} Bos, Joppe W., et al. "Selecting
Elliptic Curves for Cryptography: An Efficiency and Security Analysis."
IACR Cryptology ePrint Archive 2014 (2014): 130.
\bibitem[Bern]{Bern} Bernstein, Daniel J. "Curve25519:
new Diffie-Hellman speed records." Public Key Cryptography-PKC
2006. Springer Berlin Heidelberg, 2006. 207-228.
\bibitem[CH]{CH} Chaum, David, and Eugene Van Heyst. "Group
signatures." Advances in Cryptology\textemdash{}EUROCRYPT\textquoteright{}91.
Springer Berlin Heidelberg, 1991.
\bibitem[CN]{CN} van Saberhagen, Nicolas. "CryptoNote
v 2.0." (2013).
\bibitem[FIPS]{FIPS} SHA, NIST DRAFT. "standard: Permutation-based
hash and extendable-output functions." DRAFT FIPS 202
(2014).
\bibitem[Fu]{Fu} Fujisaki, Eiichiro. "Sub-linear size
traceable ring signatures without random oracles." IEICE
TRANSACTIONS on Fundamentals of Electronics, Communications and Computer
Sciences 95.1 (2012): 151-166.
\bibitem[FS]{FS} Fujisaki, Eiichiro, and Koutarou Suzuki. "Traceable
ring signature." Public Key Cryptography\textendash{}PKC
2007. Springer Berlin Heidelberg, 2007. 181-200.
\bibitem[IAN]{IAN} IANIX http://ianix.com/pub/curve25519-deployment.html
\bibitem[Si]{Si} Silverman, Joseph H. The arithmetic of elliptic
curves. Vol. 106. Dordrecht: Springer, 2009.
\bibitem[SN]{SN} http://lab.monero.cc/pubs/multiple\_equations\_attack.pdf
@misc{saturationUTXO,
author = {Tacotime},
title = {Saturation of Unspent Transaction Outputs},
month = {September},
year = {2014},
url = {https://bitcointalk.org/index.php?topic=789978.msg8904862#msg8904862}
}
@misc{visaTPS,
author={Manny Trillo},
title={Stress Test Prepares VisaNet for the Most Wonderful Time of the Year},
month={October},
year={2013},
url={http://www.visa.com/blogarchives/us/2013/10/10/stress-test-prepares-visanet-for-the-most-wonderful-time-of-the-year/index.html}
}
@article{nakamoto2008bitcoin,
title={Bitcoin: A peer-to-peer electronic cash system},
author={Nakamoto, Satoshi}
}
@article{massey1996estimating,
title={Estimating the parameters of a nonhomogeneous Poisson process with linear rate},
author={Massey, William A and Parker, Geraldine A and Whitt, Ward},
journal={Telecommunication Systems},
volume={5},
number={2},
pages={361--388},
year={1996},
publisher={Springer}
}
@inproceedings{decker2013information,
title={Information propagation in the bitcoin network},
author={Decker, Christian and Wattenhofer, Roger},
booktitle={Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on},
pages={1--10},
year={2013},
organization={IEEE}
}
% Verified
@techreport{chainReactions,
title={MRL-0001: A Note on Chain Reactions in Traceability in CryptoNote 2.0},
author={Noether, Surae and Noether, Sarang and Mackenzie, Adam}
institution = {Monero Research Lab},
type = {paper}
number = {0001},
year = {2014},
month = {September}
}
@techreport{block202612,
title={Counterfeiting via Merkle Tree Exploits within Virtual Currencies Employing the CryptoNote Protocol},
author={Macheta, Jan and Noether, Surae and Noether, Sarang and Smooth, Javier}
institution = {Monero Research Lab},
type = {paper}
number = {0002},
year = {2014},
month = {September}
}
@techreport{moneroNotMysterious,
title={Monero is Not That Mysterious},
author={Noether, Shen}
institution = {Monero Research Lab},
type = {paper}
number = {0003},
year = {2014},
month = {September}
}
@techreport{sdcWhitePaper,
title={ShadowCash: Zero­knowledge Anonymous Distributed E­Cash
via Traceable Ring Signatures},
author={Rynomster and Tecnovert}
institution = {ShadowCash},
type = {paper}
number = {0001},
year = {2014}
}
@incollection{rivest2001leak,
title={How to leak a secret},
author={Rivest, Ronald L and Shamir, Adi and Tauman, Yael},
booktitle={Advances in Cryptology-ASIACRYPT 2001},
pages={552--565},
year={2001},
publisher={Springer}
}
@book{johnson1977urn,
title={Urn models and their application: an approach to modern discrete probability theory},
author={Johnson, Norman Lloyd and Kotz, Samuel},
year={1977},
publisher={Wiley New York}
}
@article{klamkin1967extensions,
title={Extensions of the birthday surprise},
author={Klamkin, MS and Newman, DJ},
journal={Journal of Combinatorial Theory},
volume={3},
number={3},
pages={279--282},
year={1967},
publisher={Elsevier}
}
@inproceedings{miers2013zerocoin,
title={Zerocoin: Anonymous distributed e-cash from bitcoin},
author={Miers, Ian and Garman, Christina and Green, Matthew and Rubin, Aviel D},
booktitle={Security and Privacy (SP), 2013 IEEE Symposium on},
pages={397--411},
year={2013},
organization={IEEE}
}