共 28 条
[2]
LadderLeak: Breaking ECDSA with Less than One Bit of Nonce Leakage
[J].
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2020,
:225-242
[3]
Short Paper: An Analysis of Non-standard Bitcoin Transactions
[J].
2018 CRYPTO VALLEY CONFERENCE ON BLOCKCHAIN TECHNOLOGY (CVCBT),
2018,
:93-96
[4]
Brown D. R. L., 2009, Standards for Efficient Cryptography
[5]
Decker C, 2014, LECT NOTES COMPUT SC, V8713, P313, DOI 10.1007/978-3-319-11212-1_18
[6]
Delgado-Segura S., 2018, P INT C FIN CRYPT DA, P78
[7]
On the Security of Two-Round Multi-Signatures
[J].
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019),
2019,
:1084-1101
[8]
Fleischhackerl N, 2014, LECT NOTES COMPUT SC, V8873, P512, DOI 10.1007/978-3-662-45611-8_27
[9]
Hankerson D., 2021, Encyclopedia of Cryptography, Security and Privacy, P1
[10]
Hartmann D., 2023, Cryptology ePrint Archive