\bibitem[BBJLP]{BBJLP} Bernstein, Daniel J., et al. "Twisted edwards curves." Progress in Cryptology\textendash{}AFRICACRYPT 2008. Springer Berlin Heidelberg, 2008. 389-405. \bibitem[BCPM]{BCPM} Bos, Joppe W., et al. "Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis." IACR Cryptology ePrint Archive 2014 (2014): 130. \bibitem[Bern]{Bern} Bernstein, Daniel J. "Curve25519: new Diffie-Hellman speed records." Public Key Cryptography-PKC 2006. Springer Berlin Heidelberg, 2006. 207-228. \bibitem[CH]{CH} Chaum, David, and Eugene Van Heyst. "Group signatures." Advances in Cryptology\textemdash{}EUROCRYPT\textquoteright{}91. Springer Berlin Heidelberg, 1991. \bibitem[CN]{CN} van Saberhagen, Nicolas. "CryptoNote v 2.0." (2013). \bibitem[FIPS]{FIPS} SHA, NIST DRAFT. "standard: Permutation-based hash and extendable-output functions." DRAFT FIPS 202 (2014). \bibitem[Fu]{Fu} Fujisaki, Eiichiro. "Sub-linear size traceable ring signatures without random oracles." IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences 95.1 (2012): 151-166. \bibitem[FS]{FS} Fujisaki, Eiichiro, and Koutarou Suzuki. "Traceable ring signature." Public Key Cryptography\textendash{}PKC 2007. Springer Berlin Heidelberg, 2007. 181-200. \bibitem[IAN]{IAN} IANIX http://ianix.com/pub/curve25519-deployment.html \bibitem[Si]{Si} Silverman, Joseph H. The arithmetic of elliptic curves. Vol. 106. Dordrecht: Springer, 2009. \bibitem[SN]{SN} http://lab.monero.cc/pubs/multiple\_equations\_attack.pdf @misc{saturationUTXO, author = {Tacotime}, title = {Saturation of Unspent Transaction Outputs}, month = {September}, year = {2014}, url = {https://bitcointalk.org/index.php?topic=789978.msg8904862#msg8904862} } @misc{visaTPS, author={Manny Trillo}, title={Stress Test Prepares VisaNet for the Most Wonderful Time of the Year}, month={October}, year={2013}, url={http://www.visa.com/blogarchives/us/2013/10/10/stress-test-prepares-visanet-for-the-most-wonderful-time-of-the-year/index.html} } @article{nakamoto2008bitcoin, title={Bitcoin: A peer-to-peer electronic cash system}, author={Nakamoto, Satoshi} } @article{massey1996estimating, title={Estimating the parameters of a nonhomogeneous Poisson process with linear rate}, author={Massey, William A and Parker, Geraldine A and Whitt, Ward}, journal={Telecommunication Systems}, volume={5}, number={2}, pages={361--388}, year={1996}, publisher={Springer} } @inproceedings{decker2013information, title={Information propagation in the bitcoin network}, author={Decker, Christian and Wattenhofer, Roger}, booktitle={Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on}, pages={1--10}, year={2013}, organization={IEEE} } % Verified @techreport{chainReactions, title={MRL-0001: A Note on Chain Reactions in Traceability in CryptoNote 2.0}, author={Noether, Surae and Noether, Sarang and Mackenzie, Adam} institution = {Monero Research Lab}, type = {paper} number = {0001}, year = {2014}, month = {September} } @techreport{block202612, title={Counterfeiting via Merkle Tree Exploits within Virtual Currencies Employing the CryptoNote Protocol}, author={Macheta, Jan and Noether, Surae and Noether, Sarang and Smooth, Javier} institution = {Monero Research Lab}, type = {paper} number = {0002}, year = {2014}, month = {September} } @techreport{moneroNotMysterious, title={Monero is Not That Mysterious}, author={Noether, Shen} institution = {Monero Research Lab}, type = {paper} number = {0003}, year = {2014}, month = {September} } @techreport{sdcWhitePaper, title={ShadowCash: Zero­knowledge Anonymous Distributed E­Cash via Traceable Ring Signatures}, author={Rynomster and Tecnovert} institution = {ShadowCash}, type = {paper} number = {0001}, year = {2014} } @incollection{rivest2001leak, title={How to leak a secret}, author={Rivest, Ronald L and Shamir, Adi and Tauman, Yael}, booktitle={Advances in Cryptology-ASIACRYPT 2001}, pages={552--565}, year={2001}, publisher={Springer} } @book{johnson1977urn, title={Urn models and their application: an approach to modern discrete probability theory}, author={Johnson, Norman Lloyd and Kotz, Samuel}, year={1977}, publisher={Wiley New York} } @article{klamkin1967extensions, title={Extensions of the birthday surprise}, author={Klamkin, MS and Newman, DJ}, journal={Journal of Combinatorial Theory}, volume={3}, number={3}, pages={279--282}, year={1967}, publisher={Elsevier} } @inproceedings{miers2013zerocoin, title={Zerocoin: Anonymous distributed e-cash from bitcoin}, author={Miers, Ian and Garman, Christina and Green, Matthew and Rubin, Aviel D}, booktitle={Security and Privacy (SP), 2013 IEEE Symposium on}, pages={397--411}, year={2013}, organization={IEEE} }