{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:03:16Z","timestamp":1742979796131,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030533557"},{"type":"electronic","value":"9783030533564"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-53356-4_2","type":"book-chapter","created":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T14:06:10Z","timestamp":1601561170000},"page":"9-25","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Bitcoin Crypto\u2013Bounties for Quantum Capable Adversaries"],"prefix":"10.1007","author":[{"given":"Dragos I.","family":"Ilie","sequence":"first","affiliation":[]},{"given":"Kostis","family":"Karantias","sequence":"additional","affiliation":[]},{"given":"William J.","family":"Knottenbelt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,2]]},"reference":[{"key":"2_CR1","unstructured":"Adam, B. (2018). \nhttps:\/\/twitter.com\/adam3us\/status\/947900422697742337\n\n. Accessed: 2018-02-18."},{"key":"2_CR2","unstructured":"Aggarwal, D., Brennen, G.\u00a0K., Lee, T., Santha, M., & Tomamichel, M. (2017). Quantum attacks on bitcoin, and how to protect against them. arXiv preprint \narXiv: 1710.10377\n\n."},{"key":"2_CR3","unstructured":"American National Standards Institute. (2005). Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI X9.62."},{"key":"2_CR4","unstructured":"Antonopoulos, A.\u00a0M. (2014). Mastering Bitcoin: unlocking digital cryptocurrencies. O\u2019Reilly Media, Inc."},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Khovratovich, D., & Pustogarov, I. (2014). Deanonymisation of clients in bitcoin p2p network. In Proceedings 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 15\u201329). ACM.","DOI":"10.1145\/2660267.2660379"},{"key":"2_CR6","unstructured":"Bosch, B., & Barmes, I. (2020). Quantum computers and the Bitcoin Blockchain. \nhttps:\/\/www2.deloitte.com\/nl\/nl\/pages\/innovatie\/artikelen\/quantum-computers-and-the-bitcoin-blockchain.html\n\n. Accessed: 2020-01-18."},{"key":"2_CR7","unstructured":"Certicom Research. (2018). Certicom ECC Challenge. \nhttps:\/\/www.certicom.com\/content\/dam\/certicom\/images\/pdfs\/challenge-2009.pdf\n\n. Accessed: 2018-02-17."},{"key":"2_CR8","unstructured":"Crandall, R., & Pomerance, C.\u00a0B. (2006). Prime numbers: A computational perspective (Vol. 182). Springer Science & Business Media."},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Gervais, A., Karame, G.\u00a0O., W\u00fcst, K., Glykantzis, V., Ritzdorf, H., & Capkun, S. (2016). On the security and performance of proof of work blockchains. In Proceedings 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 3\u201316). ACM.","DOI":"10.1145\/2976749.2978341"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Grover, L.\u00a0K. (1996). A fast quantum mechanical algorithm for database search. In Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing (pp. 212\u2013219). ACM.","DOI":"10.1145\/237814.237866"},{"key":"2_CR11","unstructured":"Kalodner, H. (2020). \nhttps:\/\/twitter.com\/hkalodner\/status\/1064700672392773633\n\n. Accessed: 2020-01-18."},{"key":"2_CR12","unstructured":"Kalodner, H., Goldfeder, S., Chator, A., M\u00f6ser, M., & Narayanan, A. (2017). Blocksci: Design and applications of a blockchain analysis platform. arXiv preprint \narXiv: 1709.02489\n\n."},{"key":"2_CR13","unstructured":"Karame, G.\u00a0O., Androulaki, E., & Capkun, S. (2012). Two bitcoins at the price of one? double-spending attacks on fast payments in bitcoin. IACR Cryptology ePrint Archive (p. 248)."},{"issue":"1","key":"2_CR14","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/2732196","volume":"18","author":"GO Karame","year":"2015","unstructured":"Karame, G. O., Androulaki, E., Roeschlin, M., Gervais, A., & \u010capkun, S. (2015). Misbehavior in bitcoin: A study of double-spending and accountability. ACM Transactions on Information and System Security (TISSEC), 18(1), 2.","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"2_CR15","unstructured":"Lavor, C., Manssur, L., & Portugal, R. (2003). Shor\u2019s algorithm for factoring large integers. arXiv preprint \narXiv: quant-ph\/0303175\n\n."},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.\u00a0M., & Savage, S. (2013). A fistful of bitcoins: Characterizing payments among men with no names. In Proceedings 2013 Internet Measurement Conference (pp. 127\u2013140). ACM.","DOI":"10.1145\/2504730.2504747"},{"key":"2_CR17","unstructured":"Menezes, A. (2001). Evaluation of security level of cryptography: The elliptic curve discrete logarithm problem (ECDLP). Technical Report. University of Waterloo."},{"key":"2_CR18","unstructured":"Mosca, M., & Ekert, A. (1998). The hidden subgroup problem and eigenvalue estimation on a quantum computer. In NASA International Conference on Quantum Computing and Quantum Communications (pp. 174\u2013188). Springer."},{"key":"2_CR19","unstructured":"Proos, J., & Zalka, C. (2003). Shor\u2019s discrete logarithm quantum algorithm for elliptic curves. arXiv preprint \narXiv: quant-ph\/0301141\n\n."},{"key":"2_CR20","unstructured":"Qu, M. (1999). Sec 2: Recommended elliptic curve domain parameters. Certicom Res., Mississauga, ON, Canada, Tech. Rep. SEC2-Ver-0.6."},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Rogaway, P., & Shrimpton, T. (2004). Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In International Workshop on Fast Software Encryption (pp. 371\u2013388). Springer.","DOI":"10.1007\/978-3-540-25937-4_24"},{"key":"2_CR22","unstructured":"Rosenfeld, M. (2014). Analysis of hashrate-based double spending. arXiv preprint \narXiv: 1402.2009\n\n."},{"key":"2_CR23","unstructured":"Sattath, O. (2018). On the insecurity of quantum Bitcoin mining. arXiv preprint \narXiv: 1804.08118\n\n."},{"key":"2_CR24","unstructured":"Schneider, N. (2013). Recovering bitcoin private keys using weak signatures from the blockchain. \nhttp:\/\/www.nilsschneider.net\/2013\/01\/28\/recovering-bitcoin-private-keys.html\n\n. Accessed: 2018-02-18."},{"issue":"2","key":"2_CR25","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P. W. (1999). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Review, 41(2), 303\u2013332.","journal-title":"SIAM Review"},{"key":"2_CR26","unstructured":"Sompolinsky, Y., & Zohar, A. (2016). Bitcoin\u2019s security model revisited. arXiv preprint \narXiv: 1605.09193\n\n."},{"issue":"6","key":"2_CR27","doi-asserted-by":"publisher","first-page":"180410","DOI":"10.1098\/rsos.180410","volume":"5","author":"I Stewart","year":"2018","unstructured":"Stewart, I., Ilie, D., Zamyatin, A., Werner, S., Torshizi, M., & Knottenbelt, W. J. (2018). Committing to quantum resistance: A slow defence for bitcoin against a fast quantum computing attack. Royal Society Open Science, 5(6), 180410.","journal-title":"Royal Society Open Science"},{"key":"2_CR28","unstructured":"Tessler, L., & Byrnes, T. (2017). Bitcoin and quantum computing. arXiv preprint \narXiv: 1711.04235\n\n."},{"key":"2_CR29","unstructured":"Tim, R. (2018). \nhttps:\/\/lists.linuxfoundation.org\/pipermail\/bitcoin-dev\/2018-February\/015758.html\n\n. Accessed: 2018-02-18."},{"key":"2_CR30","first-page":"140","volume":"2014","author":"Y Yarom","year":"2014","unstructured":"Yarom, Y., & Benger, N. (2014). Recovering OpenSSL ECDSA nonces using the FLUSH+ RELOAD cache side-channel attack. IACR Cryptology ePrint Archive, 2014, 140.","journal-title":"IACR Cryptology ePrint Archive"}],"container-title":["Springer Proceedings in Business and Economics","Mathematical Research for Blockchain Economy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-53356-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T14:10:54Z","timestamp":1601561454000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-53356-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030533557","9783030533564"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-53356-4_2","relation":{},"ISSN":["2198-7246","2198-7254"],"issn-type":[{"type":"print","value":"2198-7246"},{"type":"electronic","value":"2198-7254"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"2 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}