@article{satoshi, title = {Bitcoin: A peer-to-peer electronic cash system}, url = {http://www.cryptovest.co.uk/resources/Bitcoin%20paper%20Original.pdf}, shorttitle = {Bitcoin}, author = {Nakamoto, Satoshi}, urldate = {2017-02-01}, date = {2008}, file = {[PDF] cryptovest.co.uk:/home/max/.mozilla/firefox/jeyuln4l.default/zotero/storage/JRRGC7JA/Nakamoto - 2008 - Bitcoin A peer-to-peer electronic cash system.pdf:application/pdf} } @thesis{konst, title = {Sichere Log-Dateien auf Grundlage kryptographisch verketteter Einträge}, url = {http://www.iti.cs.tu-bs.de/TI-INFO/waetjen/Diplomarbeiten/Konst.pdf}, institution = {Diplomarbeit, Institut für Theoretische Informatik, Technische Universität Braunschweig}, type = {phdthesis}, author = {Konst, Stefan}, urldate = {2017-02-01}, date = {2000}, file = {[PDF] tu-bs.de:/home/max/.mozilla/firefox/jeyuln4l.default/zotero/storage/RP7BK9B7/Konst - 2000 - Sichere Log-Dateien auf Grundlage kryptographisch .pdf:application/pdf} } @article{pilkington, title = {Blockchain technology: principles and applications}, url = {https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2728593}, shorttitle = {Blockchain technology}, journaltitle = {Browser Download This Paper}, author = {Pilkington, Marc}, urldate = {2017-02-01}, date = {2015}, file = {[PDF] sysu.edu.cn:/home/max/.mozilla/firefox/jeyuln4l.default/zotero/storage/86ASR8JZ/Pilkington - 2015 - Blockchain technology principles and applications.pdf:application/pdf;Snapshot:/home/max/.mozilla/firefox/jeyuln4l.default/zotero/storage/HCAKK48R/Papers.html:text/html} } @article{lamport, title = {The Byzantine generals problem}, volume = {4}, url = {http://dl.acm.org/citation.cfm?id=357176}, pages = {382--401}, number = {3}, journaltitle = {{ACM} Transactions on Programming Languages and Systems ({TOPLAS})}, author = {Lamport, Leslie and Shostak, Robert and Pease, Marshall}, urldate = {2017-02-01}, date = {1982}, file = {[PDF] uchicago.edu:/home/max/.mozilla/firefox/jeyuln4l.default/zotero/storage/BD2H86EK/Lamport et al. - 1982 - The Byzantine generals problem.pdf:application/pdf;Snapshot:/home/max/.mozilla/firefox/jeyuln4l.default/zotero/storage/9NRJ784C/citation.html:text/html} } @article{baran, title = {On distributed communications networks}, volume = {12}, url = {http://ieeexplore.ieee.org/abstract/document/1088883/}, pages = {1--9}, number = {1}, journaltitle = {{IEEE} transactions on Communications Systems}, author = {Baran, Paul}, urldate = {2017-02-01}, date = {1964}, file = {Snapshot:/home/max/.mozilla/firefox/jeyuln4l.default/zotero/storage/RTSPUAGA/1088883.html:text/html} } @inproceedings{chaum, title = {Untraceable electronic cash}, url = {http://dl.acm.org/citation.cfm?id=88969}, pages = {319--327}, booktitle = {Proceedings on Advances in cryptology}, publisher = {Springer-Verlag New York, Inc.}, author = {Chaum, David and Fiat, Amos and Naor, Moni}, urldate = {2017-02-01}, date = {1990}, file = {[PDF] nccu.edu.tw:/home/max/.mozilla/firefox/jeyuln4l.default/zotero/storage/Z8BRAIRB/Chaum et al. - 1990 - Untraceable electronic cash.pdf:application/pdf;Snapshot:/home/max/.mozilla/firefox/jeyuln4l.default/zotero/storage/USWRE75S/citation.html:text/html} } @inproceedings{naor, title = {Universal one-way hash functions and their cryptographic applications}, url = {http://dl.acm.org/citation.cfm?id=73011}, pages = {33--43}, booktitle = {Proceedings of the twenty-first annual {ACM} symposium on Theory of computing}, publisher = {{ACM}}, author = {Naor, Moni and Yung, Moti}, urldate = {2017-02-01}, date = {1989}, file = {[PDF] psu.edu:/home/max/.mozilla/firefox/jeyuln4l.default/zotero/storage/IXBGG52S/Naor and Yung - 1989 - Universal one-way hash functions and their cryptog.pdf:application/pdf;Snapshot:/home/max/.mozilla/firefox/jeyuln4l.default/zotero/storage/C42K8EFV/citation.html:text/html} } @article{sha_standard, title = {{FIPS} {PUB} 180-2}, url = {http://downloads.german-pavilion.com/downloads/pdf/exhibitor_16210.pdf}, journaltitle = {National Institute of Standards and Technology}, author = {Standard, Secure Hash}, urldate = {2017-02-01}, date = {2002}, file = {Snapshot:/home/max/.mozilla/firefox/jeyuln4l.default/zotero/storage/4G9PJD8G/exhibitor_16210.pdf:application/pdf} } @inproceedings{dobraunig, title = {Analysis of {SHA}-512/224 and {SHA}-512/256}, rights = {©2015 International Association for Cryptologc Research}, isbn = {978-3-662-48799-0 978-3-662-48800-3}, url = {http://link.springer.com/chapter/10.1007/978-3-662-48800-3_25}, series = {Lecture Notes in Computer Science}, abstract = {In 2012, {NIST} standardized {SHA}-512/224 and {SHA}-512/256, two truncated variants of {SHA}-512, in {FIPS} 180-4. These two hash functions are faster than {SHA}-224 and {SHA}-256 on 64-bit platforms, while maintaining the same hash size and claimed security level. So far, no third-party analysis of {SHA}-512/224 or {SHA}-512/256 has been published. In this work, we examine the collision resistance of step-reduced versions of {SHA}-512/224 and {SHA}-512/256 by using differential cryptanalysis in combination with sophisticated search tools. We are able to generate practical examples of free-start collisions for 44-step {SHA}-512/224 and 43-step {SHA}-512/256. Thus, the truncation performed by these variants on their larger state allows us to attack several more rounds compared to the untruncated family members. In addition, we improve upon the best published collisions for 24-step {SHA}-512 and present practical collisions for 27 steps of {SHA}-512/224, {SHA}-512/256, and {SHA}-512.}, eventtitle = {International Conference on the Theory and Application of Cryptology and Information Security}, pages = {612--630}, booktitle = {Advances in Cryptology – {ASIACRYPT} 2015}, publisher = {Springer Berlin Heidelberg}, author = {Dobraunig, Christoph and Eichlseder, Maria and Mendel, Florian}, editor = {Iwata, Tetsu and Cheon, Jung Hee}, urldate = {2017-02-01}, date = {2014-12-07}, langid = {english}, note = {{DOI}: 10.1007/978-3-662-48800-3\_25}, keywords = {Coding and Information Theory, Collisions, Cryptanalysis, Data Encryption, Free-start collisions, Hash functions, Management of Computing and Information Systems, Mathematics of Computing, {SHA}-2, {SHA}-512, {SHA}-512/224, {SHA}-512/256, Systems and Data Security, Theory of Computation}, file = {Snapshot:/home/max/.mozilla/firefox/jeyuln4l.default/zotero/storage/MVCTXM9F/978-3-662-48800-3_25.html:text/html} } @inproceedings{merkle, title = {Protocols for public key cryptosystems}, url = {http://ieeexplore.ieee.org/abstract/document/6233691/}, pages = {122--122}, booktitle = {Security and Privacy, 1980 {IEEE} Symposium on}, publisher = {{IEEE}}, author = {Merkle, Ralph C.}, urldate = {2017-02-01}, date = {1980}, file = {[PDF] semanticscholar.org:/home/max/.mozilla/firefox/jeyuln4l.default/zotero/storage/9FKX688Q/Merkle - 1980 - Protocols for public key cryptosystems.pdf:application/pdf;Snapshot:/home/max/.mozilla/firefox/jeyuln4l.default/zotero/storage/8NXUDHJX/6233691.html:text/html} } @inproceedings{barber, title = {Bitter to better—how to make bitcoin a better currency}, url = {http://link.springer.com/chapter/10.1007/978-3-642-32946-3_29}, pages = {399--414}, booktitle = {International Conference on Financial Cryptography and Data Security}, publisher = {Springer}, author = {Barber, Simon and Boyen, Xavier and Shi, Elaine and Uzun, Ersin}, urldate = {2017-02-01}, date = {2012}, file = {[PDF] qut.edu.au:/home/max/.mozilla/firefox/jeyuln4l.default/zotero/storage/E2WIV5K4/Barber et al. - 2012 - Bitter to better—how to make bitcoin a better curr.pdf:application/pdf;Snapshot:/home/max/.mozilla/firefox/jeyuln4l.default/zotero/storage/6UAIIRFM/978-3-642-32946-3_29.html:text/html} } @inproceedings{bonneau, title = {Sok: Research perspectives and challenges for bitcoin and cryptocurrencies}, url = {http://ieeexplore.ieee.org/abstract/document/7163021/}, shorttitle = {Sok}, pages = {104--121}, booktitle = {Security and Privacy ({SP}), 2015 {IEEE} Symposium on}, publisher = {{IEEE}}, author = {Bonneau, Joseph and Miller, Andrew and Clark, Jeremy and Narayanan, Arvind and Kroll, Joshua A. and Felten, Edward W.}, urldate = {2017-02-01}, date = {2015}, file = {[PDF] ieee-security.org:/home/max/.mozilla/firefox/jeyuln4l.default/zotero/storage/BMW6KXJX/Bonneau et al. - 2015 - Sok Research perspectives and challenges for bitc.pdf:application/pdf;Snapshot:/home/max/.mozilla/firefox/jeyuln4l.default/zotero/storage/72QJCR8M/7163021.html:text/html} } @online{cohen, title = {Global Bitcoin Computing Power Now 256 Times Faster Than Top 500 Supercomputers, Combined!}, url = {http://www.forbes.com/sites/reuvencohen/2013/11/28/global-bitcoin-computing-power-now-256-times-faster-than-top-500-supercomputers-combined/}, abstract = {I admit, like a lot of others, I’ve found myself with a bit of a bitcoin obsession lately. I find the vast amount of effort it takes to create something that doesn’t actually exist, completely fascinating. So I decided to find out how much computing power is exerted in the [...]}, titleaddon = {Forbes}, author = {Cohen, Reuven}, urldate = {2017-02-01}, file = {Snapshot:/home/max/.mozilla/firefox/jeyuln4l.default/zotero/storage/UBHCKJMG/global-bitcoin-computing-power-now-256-times-faster-than-top-500-supercomputers-combined.html:text/html} } @online{crypto_mining_blog, title = {The Size of the Bitcoin Blockchain Data Files Has Reached 60GB - Crypto Mining Blog}, url = {http://cryptomining-blog.com/6397-the-size-of-the-bitcoin-blockchain-data-files-has-reached-60gb/}, author = {{Crypto Mining Blog}}, urldate = {2017-02-02}, file = {The Size of the Bitcoin Blockchain Data Files Has Reached 60GB - Crypto Mining Blog:/home/max/.mozilla/firefox/jeyuln4l.default/zotero/storage/25EWC9JD/6397-the-size-of-the-bitcoin-blockchain-data-files-has-reached-60gb.html:text/html} } @article{king_ppcoin, title = {Ppcoin: Peer-to-peer crypto-currency with proof-of-stake}, volume = {19}, url = {http://peerco.in/assets/paper/peercoin-paper.pdf}, shorttitle = {Ppcoin}, journaltitle = {self-published paper, August}, author = {King, Sunny and Nadal, Scott}, urldate = {2017-02-02}, date = {2012}, file = {[PDF] peerco.in:/home/max/.mozilla/firefox/jeyuln4l.default/zotero/storage/NJ36ID78/King and Nadal - 2012 - Ppcoin Peer-to-peer crypto-currency with proof-of.pdf:application/pdf} }