Back to Results
First PageMeta Content
Cyberwarfare / Security / Software / Bitcoin / Peer-to-peer computing / Electronic commerce / RSA / Key size / Key / Key management / Public-key cryptography / Cryptography


Hierarchical deterministic Bitcoin wallets that tolerate key leakage (Short paper) Gus Gutoski1 and Douglas Stebila2 1
Add to Reading List

Document Date: 2014-12-15 21:49:39


Open Document

File Size: 215,41 KB

Share Result on Facebook

City

Waterloo / /

Company

Q. / G. / /

Country

Canada / Australia / /

Currency

USD / /

/

Facility

National Institute of Standards and Technology / Perimeter Institute / Mathematical Sciences Queensland University of Technology / /

IndustryTerm

online wallet service / web merchant receiving payment / vulnerable online server / bank / trustless audit / vulnerable server / Internet retail / generic additive / correct solution / open-source software / web merchant / wallet software / /

Organization

National Institute of Standards and Technology / Ministry of Research and Innovation / Government of Canada / Perimeter Institute / Queensland University of Technology / Brisbane / U.S. Securities and Exchange Commission / Australian Research Council / School of Electrical Engineering and Computer Science / Perimeter Institute for Theoretical Physics / /

Position

author / auditor and a department manager / Prime Minister / combined treasurer-auditor / treasurer / auditor / /

ProvinceOrState

Ontario / /

Technology

cryptography / public key / peer-to-peer / private key / DLP / Digital Signature / pdf / /

URL

http /

SocialTag