Tag: cryptocurrency


Found 89 results for 'cryptocurrency'.


1) public-key - Why are public keys derived from elliptic curve cryptography (ECC) and not from hashing?
2) elliptic-curves - ECC partially blind signature scheme verification
3) implementation - Sane implementations of Bitcoin cryptography routines w.r.t. side-channel attacks
4) elliptic-curves - Optimized modular multiplicative inverse for Bitcoin (secp256k1)
5) encryption - Question on using endomorphism on secp256k1 and negative results
6) sha-256 - How to deal with collisions in Bitcoin addresses?
7) elliptic-curves - ECC private key generation collision
8) zero-knowledge-proofs - Creating a private cryptocurrency without trusted setup
9) passwords - Recovery Passphrase Collission for BIP-39 and BIP-44
10) public-key - Cryptographic limit to total accounts in secp256k1
11) cryptocurrency - How secure is the Bitcoin protocol?
12) sha-256 - Would SHA-256(SHA-256(x)) produce collisions?
13) random-number-generator - DIY TRNG on an embedded system for Ethereum private key generation
14) elliptic-curves - Is there a flaw in this ECC blind signature scheme?
15) hash - Does the One-Time Hash-based Signature Scheme render Ring Signatures useless?
16) zero-knowledge-proofs - Lack of usage of secrets in ZK Bitcoin ownership proof
17) public-key - How to find at least one private key from a large list of compressed public keys secp256k1
18) passwords - BIP 39: If I mix my 24 seed phrase with another 24 words, will the checksum property allow an attacker to retrieve the original seed phrase?
19) public-key - Best method of converting a private key string into a 12 word mnemonic?
20) signature - Signature Aggregation / Multi-Signature
21) rsa - Is RSA secure enough to protect bitcoin private keys?
22) encryption - Large Volumes of Asymmetric Encryption
23) reference-request - A general definition for cryptocurrencies
24) cryptocurrency - How are objects sold as NFT's ("non-fungible tokens")?
25) encryption - Is there a way to bruteforce the private key of this cryptocurrency altcoin?
26) sha-256 - Question regarding multiple SHA-256 rounds on a Bitcoin Brain Wallet passphrase…
27) public-key - Zencash uses your passphrase to identify AND unlock a wallet - how is this secure?
28) cryptocurrency - How does hardware wallet recovery work?
29) elliptic-curves - Modulo p in Elliptic Curve Cryptography
30) encryption - Can Bitcoin HD public keys be used for symmetric encryption?
31) protocol-design - Could eVoting on the bitcoin blockchain be done?
32) protocol-design - Piggyback on Bitcoin for independent data verification?
33) cryptocurrency - Can a digital money system exist, that's secure, anonymous and allows offline transactions?
34) brute-force-attack - SHA-256: (Probabilistic?) partial preimage possible?
35) public-key - Doesn't d6 to binary for 256-bit bitcoin private key generation produce biased results?
36) hash - How might one create a system of election by lot (sortition) that is both secure and verifiable?
37) signature - Is there a signature scheme which doesn't rely on the difficulty of factoring/dlp which generates short signatures?
38) elliptic-curves - Why can't you hijack someone's public key
39) hash - How can uniformity of hash functions (e.g. SHA-256) be proved?
40) reference-request - Bitcoin Research
41) signature - Whats wrong with my El Gamal signature example
42) hash - Is double SHA-256 the best choice for Bitcoin?
43) encryption - How can I understand the math behind crypto, especially that used in blockchains / distributed ledgers?
44) key-derivation - Question about Harden and Normal Key derivation
45) public-key - Related Key Attack on Schnorr Signature - Why does the challenge include $\psi = g^x$, not $y$?
46) aes - Encrypting cryptocurrency seeds for cold storage
47) anonymity - Why is Tor alone not enough to guarantee anonymity for Bitcoin?
48) zero-knowledge-proofs - zkSNARKS: What prevents the prover from chosing a different polynomial than the one he is expected to know
49) cryptocurrency - How are new coins minted in Proof of Stake systems
50) symmetric - Do I need to use HMAC in this crypto wallet backup application?