Speed Optimizations in Bitcoin Key Recovery Attacks-Cryptology ePrint Archive

Speed Optimizations in Bitcoin Key Recovery Attacks-Cryptology ePrint Archive

In this paper we study and give the first detailed benchmarks on existing implementations of the secp256k1 elliptic curve nused by at least hundreds of thousands of users in ...

Incentive Compatibility of Bitcoin Mining Pool Reward Functions

Incentive Compatibility of Bitcoin Mining Pool Reward Functions

In this paper we introduce a game-theoretic model for reward functions within a single Bitcoin mining pool. Our model consists only of an unordered history of reported shares and ...

The Bitcoin Brain Drain: A Short Paper on the Use and Abuse of Bitcoin Brain Wallets

The Bitcoin Brain Drain: A Short Paper on the Use and Abuse of Bitcoin Brain Wallets

In the cryptocurrency Bitcoin, users can deterministically derive the private keys used for transmitting money from a password. Such “brain wallets” are appealing because they ...

Stressing Out: Bitcoin “Stress Testing”-Financial Cryptography and Data Security 2016

Stressing Out: Bitcoin “Stress Testing”-Financial Cryptography and Data Security 2016

In this paper, we present an empirical study of a recent spam campaign (a “stress test”) that resulted in a DoS attack on Bitcoin. The goal of our investigation being to ...

Of Two Minds, Multiple Addresses, and One Ledger: Characterizing Opinions, Knowledge, and Perceptions of Bitcoin Across Users and Non-Users-SIGCHI 2016 Proceedings

Of Two Minds, Multiple Addresses, and One Ledger: Characterizing Opinions, Knowledge, and Perceptions of Bitcoin Across Users and Non-Users-SIGCHI 2016 Proceedings

Digital currencies represent a new method for exchange – a payment method with no physical form, made real by the Internet. This new type of currency was created to ease online ...

Bitcoin Covenants-Financial Cryptography and Data Security 2016 X

Bitcoin Covenants-Financial Cryptography and Data Security 2016 X

This paper presents an extension to Bitcoin’s script language enabling covenants, a primitive that allows transactions to restrict how the value they transfer is used in the ...

Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions-Cryptology ePrint Archive

Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions-Cryptology ePrint Archive

Although Bitcoin is often perceived to be an anonymous currency, research nhas shown that a user’s Bitcoin transactions can be linked to compromise the user’s anonymity. We ...

The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy?-Financial Cryptography and Data Security 2016

The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy?-Financial Cryptography and Data Security 2016

We present the first large-scale survey to investigate how users experience the Bitcoin ecosystem in terms of security, privacy and anonymity. We surveyed 990 Bitcoin users to ...

Bitcoin: Main Trends and Perspectives-British Journal of Economics, Management & Trade

Bitcoin: Main Trends and Perspectives-British Journal of Economics, Management & Trade

Background: Methodological ground for Bitcoin (BTC) as a variation of private money was settled by F. von Hayek (Denationalization of Money: An Analysis of the Theory and Practice ...

(Estonian language) Development of Universal Cryptocurrency Wallet Services: A Case Study of Bitplexus-Thesis

(Estonian language) Development of Universal Cryptocurrency Wallet Services: A Case Study of Bitplexus-Thesis

The purpose of this thesis is to develop a secure web-based wallet application allowing cryptocurrency users to manage their funds without any additional obligations (e.g. ...