research-lab/publications/research-bulletins/MRL-0002 - Counterfeiting via Merkle Tree Exploits within Virtual Currencies Employing the CryptoNote Protocol/biblio.bib
2017-06-14 17:22:01 -06:00

29 lines
885 B
BibTeX
Executable file
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

@inproceedings{merkle1988digital,
title={A digital signature based on a conventional encryption function},
author={Merkle, Ralph C},
booktitle={Advances in Cryptology—CRYPTO87},
pages={369--378},
year={1988},
organization={Springer}
}
@article{anderson1993classification,
title={The classification of hash functions},
author={Anderson, Ross},
year={1993},
publisher={Citeseer}
}
@book{viega2003secure,
title={Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation \& More},
author={Viega, John and Messier, Matt},
year={2003},
publisher={O'Reilly Media, Inc.}
}
@manual{CryptoNote:2014,
title = "Monero Network Exploit Post-Mortem",
author = "Werner Albert",
note = "\url{https://forum.cryptonote.org/viewtopic.php?f=7&t=270}",
year = "2014 (accessed Sept 15, 2014)"
}