research-lab/publications/bulletins/MRL-0004-recommendations/biblio.bib
2017-10-03 18:18:26 -06:00

158 lines
4.9 KiB
BibTeX
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

\bibitem[BBJLP]{BBJLP} Bernstein, Daniel J., et al. "Twisted
edwards curves." Progress in Cryptology\textendash{}AFRICACRYPT
2008. Springer Berlin Heidelberg, 2008. 389-405.
\bibitem[BCPM]{BCPM} Bos, Joppe W., et al. "Selecting
Elliptic Curves for Cryptography: An Efficiency and Security Analysis."
IACR Cryptology ePrint Archive 2014 (2014): 130.
\bibitem[Bern]{Bern} Bernstein, Daniel J. "Curve25519:
new Diffie-Hellman speed records." Public Key Cryptography-PKC
2006. Springer Berlin Heidelberg, 2006. 207-228.
\bibitem[CH]{CH} Chaum, David, and Eugene Van Heyst. "Group
signatures." Advances in Cryptology\textemdash{}EUROCRYPT\textquoteright{}91.
Springer Berlin Heidelberg, 1991.
\bibitem[CN]{CN} van Saberhagen, Nicolas. "CryptoNote
v 2.0." (2013).
\bibitem[FIPS]{FIPS} SHA, NIST DRAFT. "standard: Permutation-based
hash and extendable-output functions." DRAFT FIPS 202
(2014).
\bibitem[Fu]{Fu} Fujisaki, Eiichiro. "Sub-linear size
traceable ring signatures without random oracles." IEICE
TRANSACTIONS on Fundamentals of Electronics, Communications and Computer
Sciences 95.1 (2012): 151-166.
\bibitem[FS]{FS} Fujisaki, Eiichiro, and Koutarou Suzuki. "Traceable
ring signature." Public Key Cryptography\textendash{}PKC
2007. Springer Berlin Heidelberg, 2007. 181-200.
\bibitem[IAN]{IAN} IANIX http://ianix.com/pub/curve25519-deployment.html
\bibitem[Si]{Si} Silverman, Joseph H. The arithmetic of elliptic
curves. Vol. 106. Dordrecht: Springer, 2009.
\bibitem[SN]{SN} http://lab.monero.cc/pubs/multiple\_equations\_attack.pdf
@misc{saturationUTXO,
author = {Tacotime},
title = {Saturation of Unspent Transaction Outputs},
month = {September},
year = {2014},
url = {https://bitcointalk.org/index.php?topic=789978.msg8904862#msg8904862}
}
@misc{visaTPS,
author={Manny Trillo},
title={Stress Test Prepares VisaNet for the Most Wonderful Time of the Year},
month={October},
year={2013},
url={http://www.visa.com/blogarchives/us/2013/10/10/stress-test-prepares-visanet-for-the-most-wonderful-time-of-the-year/index.html}
}
@article{nakamoto2008bitcoin,
title={Bitcoin: A peer-to-peer electronic cash system},
author={Nakamoto, Satoshi}
}
@article{massey1996estimating,
title={Estimating the parameters of a nonhomogeneous Poisson process with linear rate},
author={Massey, William A and Parker, Geraldine A and Whitt, Ward},
journal={Telecommunication Systems},
volume={5},
number={2},
pages={361--388},
year={1996},
publisher={Springer}
}
@inproceedings{decker2013information,
title={Information propagation in the bitcoin network},
author={Decker, Christian and Wattenhofer, Roger},
booktitle={Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on},
pages={1--10},
year={2013},
organization={IEEE}
}
% Verified
@techreport{chainReactions,
title={MRL-0001: A Note on Chain Reactions in Traceability in CryptoNote 2.0},
author={Noether, Surae and Noether, Sarang and Mackenzie, Adam}
institution = {Monero Research Lab},
type = {paper}
number = {0001},
year = {2014},
month = {September}
}
@techreport{block202612,
title={Counterfeiting via Merkle Tree Exploits within Virtual Currencies Employing the CryptoNote Protocol},
author={Macheta, Jan and Noether, Surae and Noether, Sarang and Smooth, Javier}
institution = {Monero Research Lab},
type = {paper}
number = {0002},
year = {2014},
month = {September}
}
@techreport{moneroNotMysterious,
title={Monero is Not That Mysterious},
author={Noether, Shen}
institution = {Monero Research Lab},
type = {paper}
number = {0003},
year = {2014},
month = {September}
}
@techreport{sdcWhitePaper,
title={ShadowCash: Zero­knowledge Anonymous Distributed E­Cash
via Traceable Ring Signatures},
author={Rynomster and Tecnovert}
institution = {ShadowCash},
type = {paper}
number = {0001},
year = {2014}
}
@incollection{rivest2001leak,
title={How to leak a secret},
author={Rivest, Ronald L and Shamir, Adi and Tauman, Yael},
booktitle={Advances in Cryptology-ASIACRYPT 2001},
pages={552--565},
year={2001},
publisher={Springer}
}
@book{johnson1977urn,
title={Urn models and their application: an approach to modern discrete probability theory},
author={Johnson, Norman Lloyd and Kotz, Samuel},
year={1977},
publisher={Wiley New York}
}
@article{klamkin1967extensions,
title={Extensions of the birthday surprise},
author={Klamkin, MS and Newman, DJ},
journal={Journal of Combinatorial Theory},
volume={3},
number={3},
pages={279--282},
year={1967},
publisher={Elsevier}
}
@inproceedings{miers2013zerocoin,
title={Zerocoin: Anonymous distributed e-cash from bitcoin},
author={Miers, Ian and Garman, Christina and Green, Matthew and Rubin, Aviel D},
booktitle={Security and Privacy (SP), 2013 IEEE Symposium on},
pages={397--411},
year={2013},
organization={IEEE}
}