{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T13:09:27Z","timestamp":1762607367575,"version":"3.37.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030004699"},{"type":"electronic","value":"9783030004705"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00470-5_29","type":"book-chapter","created":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T06:43:19Z","timestamp":1536216199000},"page":"623-643","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Identifying Key Leakage of Bitcoin Users"],"prefix":"10.1007","author":[{"given":"Michael","family":"Brengel","sequence":"first","affiliation":[]},{"given":"Christian","family":"Rossow","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,7]]},"reference":[{"key":"29_CR1","unstructured":"https:\/\/coinmarketcap.com\/currencies\/bitcoin\/\n\n. Accessed 27 Mar 2018"},{"key":"29_CR2","unstructured":"https:\/\/coinmarketcap.com\/currencies\/ethereum\/\n\n. Accessed 27 Mar 2018"},{"key":"29_CR3","unstructured":"https:\/\/pastebin.com\n\n. Accessed 27 Mar 2018"},{"key":"29_CR4","unstructured":"https:\/\/bitcoin.org\/en\/alert\/2013-08-11-android\n\n. Accessed 27 Mar 2018"},{"key":"29_CR5","unstructured":"https:\/\/bitcointalk.org\/index.php?topic=581411.0\n\n. Accessed 27 Mar 2018"},{"key":"29_CR6","unstructured":"https:\/\/bitcointalk.org\/index.php?topic=1118704.0\n\n. Accessed 27 Mar 2018"},{"key":"29_CR7","unstructured":"https:\/\/bitcointalk.org\/index.php?topic=1431060.0\n\n. Accessed 27 Mar 2018"},{"key":"29_CR8","unstructured":"https:\/\/events.ccc.de\/congress\/2010\/Fahrplan\/attachments\/1780_27c3_console_hacking_2010.pdf\n\n (2010). Accessed 27 Mar 2018"},{"key":"29_CR9","unstructured":"Back, A.: Hashcash - a denial of service counter-measure (2002)"},{"key":"29_CR10","unstructured":"Castellucci, R., Valsorda, F.: Stealing Bitcoin with Math. \nhttps:\/\/news.webamooz.com\/wp-content\/uploads\/bot\/offsecmag\/151.pdf\n\n. Accessed 27 Mar 2018"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Decker, C., Wattenhofer, R.: Bitcoin transaction malleability and MtGox. In: Proceedings of the European Symposium on Research in Computer Security (ESORICS) (2014)","DOI":"10.1007\/978-3-319-11212-1_18"},{"key":"29_CR12","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22, 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Eskandari, S., Barrera, D., Stobert, E., Clark, J.: A first look at the usability of bitcoin key management. In: Proceedings of the Workshop on Usable Security (USEC) (2015)","DOI":"10.14722\/usec.2015.23015"},{"key":"29_CR14","unstructured":"Heninger, N., Durumeric, Z., Wustrow, E., Halderman, J.A.: Mining your Ps and Qs: detection of widespread weak keys in network devices. In: Proceedings of the USENIX Security Symposium (USENIX Security) (2012)"},{"key":"29_CR15","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48, 203\u2013209 (1987)","journal-title":"Math. Comput."},{"key":"29_CR16","unstructured":"Matic, S., Fattori, A., Bruschi, D., Cavallaro, L.: Peering into the muddy waters of pastebin. ERCIM News (2012)"},{"key":"29_CR17","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"29_CR18","first-page":"1732","volume":"5","author":"AM Naware","year":"2016","unstructured":"Naware, A.M.: Bitcoins, its advantages and security threats. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 5, 1732\u20131735 (2016)","journal-title":"Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET)"},{"key":"29_CR19","unstructured":"Pornin, T.: Deterministic usage of the digital signature algorithm (DSA) and elliptic curve digital signature algorithm (ECDSA) (2013). \nhttps:\/\/rfc-editor.org\/rfc\/rfc6979.txt"},{"key":"29_CR20","unstructured":"Sabottke, C., Suciu, O., Dumitras, T.: Vulnerability disclosure in the age of social media: exploiting Twitter for predicting real-world exploits. In: Proceedings of the USENIX Security Symposium (USENIX Security) (2015)"},{"key":"29_CR21","unstructured":"Valsorda, F.: Exploiting ECDSA failures in the bitcoin blockchain. In: Proceedings of Hack In The Box (HITB) (2014)"},{"key":"29_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/978-3-662-54970-4_36","volume-title":"Financial Cryptography and Data Security","author":"M Vasek","year":"2017","unstructured":"Vasek, M., Bonneau, J., Castellucci, R., Keith, C., Moore, T.: The bitcoin brain drain: examining the use and abuse of bitcoin brain wallets. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 609\u2013618. Springer, Heidelberg (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-662-54970-4_36"},{"key":"29_CR23","unstructured":"Wood, G.: Ethereum: a next-generation smart contract and decentralized application platform (2018). \nhttps:\/\/ethereum.github.io\/yellowpaper\/paper.pdf\n\n. Accessed 27 Mar 2018"},{"key":"29_CR24","doi-asserted-by":"crossref","unstructured":"Zhu, Z., Dumitras, T.: FeatureSmith: automatically engineering features for malware detection by mining the security literature. In: Proceedings of the Conference on Computer and Communications Security (CCS) (2016)","DOI":"10.1145\/2976749.2978304"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00470-5_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T07:10:25Z","timestamp":1536217825000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00470-5_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030004699","9783030004705"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00470-5_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}