Two-Factor Authentication for the Bitcoin Protocol
- 9 December 2015
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- Predictability of Android OpenSSL's pseudo random number generatorPublished by Association for Computing Machinery (ACM) ,2013
- Generating safe primesJournal of Mathematical Cryptology, 2013
- A robust threshold elliptic curve digital signature providing a new verifiable secret sharing schemePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Statistical zero knowledge protocols to prove modular polynomial relationsPublished by Springer Science and Business Media LLC ,1997
- Robust Threshold DSS SignaturesLecture Notes in Computer Science, 1996
- Threshold DSS Signatures without a Trusted PartyLecture Notes in Computer Science, 1995
- Group-oriented (t, n) threshold digital signature scheme and digital multisignatureIEE Proceedings - Computers and Digital Techniques, 1994
- Untraceable Electronic CashLecture Notes in Computer Science, 1990
- Proving Security Against Chosen Ciphertext AttacksLecture Notes in Computer Science, 1990
- Completeness theorems for non-cryptographic fault-tolerant distributed computationPublished by Association for Computing Machinery (ACM) ,1988