{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:23:20Z","timestamp":1742981000683,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031786785"},{"type":"electronic","value":"9783031786792"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-78679-2_6","type":"book-chapter","created":{"date-parts":[[2025,2,15]],"date-time":"2025-02-15T09:29:57Z","timestamp":1739611797000},"page":"101-118","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Truncator: Time-Space Tradeoff of\u00a0Cryptographic Primitives"],"prefix":"10.1007","author":[{"given":"Foteini","family":"Baldimtsi","sequence":"first","affiliation":[]},{"given":"Konstantinos","family":"Chalkias","sequence":"additional","affiliation":[]},{"given":"Panagiotis","family":"Chatzigiannis","sequence":"additional","affiliation":[]},{"given":"Mahimna","family":"Kelkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,16]]},"reference":[{"key":"6_CR1","unstructured":"Ethereum developer resources. https:\/\/ethereum.org\/en\/developers\/docs\/blocks\/"},{"key":"6_CR2","unstructured":"Ethereum gas golfing. https:\/\/ethereum.org\/en\/developers\/docs\/mev\/#mev-extraction-gas-golfing"},{"key":"6_CR3","unstructured":"Evolution of the signature size in bitcoin. https:\/\/b10c.me\/blog\/006-evolution-of-the-bitcoin-signature-length\/"},{"key":"6_CR4","unstructured":"An incomplete guide to rollups. https:\/\/vitalik.ca\/general\/2021\/01\/05\/rollup.html"},{"key":"6_CR5","unstructured":"Length of ecdsa signatures. https:\/\/transactionfee.info\/charts\/bitcoin-script-ecdsa-length\/"},{"key":"6_CR6","unstructured":"Profanity ethereum vanity address tool. https:\/\/github.com\/johguse\/profanity"},{"key":"6_CR7","unstructured":"Vanitygen. https:\/\/en.bitcoin.it\/wiki\/Vanitygen"},{"key":"6_CR8","unstructured":"A vulnerability disclosed in profanity, an ethereum vanity address tool. https:\/\/blog.1inch.io\/a-vulnerability-disclosed-in-profanity-an-ethereum-vanity-address-tool-68ed7455fc8c"},{"key":"6_CR9","unstructured":"What is the bitcoin block size limit?. https:\/\/bitcoinmagazine.com\/guides\/what-is-the-bitcoin-block-size-limit"},{"key":"6_CR10","unstructured":"Would it matter if my miner was hashing random vs incremental values?. https:\/\/crypto.stackexchange.com\/questions\/29318\/would-it-matter-if-my-miner-was-hashing-random-vs-incremental-values"},{"key":"6_CR11","unstructured":"Random sampling vs incrementing randomness in cryptographic protocols (2021). https:\/\/crypto.stackexchange.com\/questions\/93651\/random-sampling-vs-incrementing-randomness-in-cryptographic-protocols"},{"key":"6_CR12","unstructured":"Baldimtsi, F., Chalkias, K., Chatzigiannis, P., Kelkar, M.: Truncator: Time-space tradeoff of cryptographic primitives. Cryptology ePrint Archive, Report 2022\/1581 (2022). https:\/\/eprint.iacr.org\/2022\/1581"},{"key":"6_CR13","unstructured":"Benet, J.: IPFS - content addressed, versioned, P2P file system. CoRR abs\/1407.3561 (2014). http:\/\/arxiv.org\/abs\/1407.3561"},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1007\/978-3-031-07085-3_21","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2022: 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 \u2013 June 3, 2022, Proceedings, Part II","author":"J Blocki","year":"2022","unstructured":"Blocki, J., Lee, S.: On the multi-user security of short schnorr signatures with preprocessing. In: Dunkelman, O., Dziembowski, S. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2022: 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 \u2013 June 3, 2022, Proceedings, Part II, pp. 614\u2013643. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-07085-3_21"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/978-3-030-26948-7_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2019","author":"D Boneh","year":"2019","unstructured":"Boneh, D., B\u00fcnz, B., Fisch, B.: Batching techniques for accumulators with applications to iops and stateless blockchains. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019. LNCS, vol. 11692, pp. 561\u2013586. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26948-7_20"},{"key":"6_CR16","unstructured":"Bonneau, J., Meckler, I., Rao, V., Shapiro, E.: Coda: Decentralized cryptocurrency at scale. Cryptology ePrint Archive, Report 2020\/352 (2020). https:\/\/eprint.iacr.org\/2020\/352"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/978-3-030-75539-3_24","volume-title":"Topics in Cryptology \u2013 CT-RSA 2021","author":"K Chalkias","year":"2021","unstructured":"Chalkias, K., Garillot, F., Kondi, Y., Nikolaenko, V.: Non-interactive Half-Aggregation of EdDSA and Variants of Schnorr Signatures. In: Paterson, K.G. (ed.) CT-RSA 2021. LNCS, vol. 12704, pp. 577\u2013608. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75539-3_24"},{"key":"6_CR18","unstructured":"Chalkias, K., Garillot, F., Lindstr\u00f8m, J., Riva, B., Wang, J.: fastcrypto v0.1.3. https:\/\/crates.io\/crates\/fastcrypto"},{"key":"6_CR19","unstructured":"Dang, Q.: Nist special publication 800-106: Randomized hashing for digital signatures (2009). https:\/\/nvlpubs.nist.gov\/nistpubs\/legacy\/sp\/nistspecialpublication800-106.pdf"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Dang, Q.: Recommendation for applications using approved hash algorithms (2012). https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-107r1.pdf","DOI":"10.6028\/NIST.SP.800-107r1"},{"key":"6_CR21","unstructured":"Fleischhacker, N., Larsen, K.G., Simkin, M.: How to compress encrypted data. Cryptology ePrint Archive, Paper 2022\/1413 (2022). https:\/\/eprint.iacr.org\/2022\/1413"},{"key":"6_CR22","unstructured":"Fregly, A., Harvey, J., Jr., B.S.K., Sheth, S.: Merkle tree ladder mode: Reducing the size impact of nist pqc signature algorithms in practice. Cryptology ePrint Archive, Paper 2022\/1730 (2022). https:\/\/eprint.iacr.org\/2022\/1730"},{"key":"6_CR23","unstructured":"Knudsen, L.R.: Small size hashes with enhanced security. Int. J. Netw. Secur. 2(1), 41\u201342 (2006). http:\/\/ijns.jalaxy.com.tw\/contents\/ijns-v2-n1\/ijns-2006-v2-n1-p41-42.pdf"},{"key":"6_CR24","unstructured":"Lamport, L.: Constructing digital signatures from a one way function (1979)"},{"key":"6_CR25","unstructured":"McCurdy, W.: Hackers nab nearly 1m in crypto from ethereum vanity adress exploit. https:\/\/decrypt.co\/110526\/hackers-nab-nearly-1-million-crypto-ethereum-vanity-adress-exploit"},{"key":"6_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-78381-9_1","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"D Micciancio","year":"2018","unstructured":"Micciancio, D., Walter, M.: On the bit security of cryptographic primitives. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10820, pp. 3\u201328. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78381-9_1"},{"key":"6_CR27","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2009). http:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"6_CR28","unstructured":"NIST: NIST key-length recommendations (2020). https:\/\/www.keylength.com\/en\/4\/"},{"key":"6_CR29","unstructured":"OpenZeppelin: Constructing an erc721 token contract. https:\/\/docs.openzeppelin.com\/contracts\/4.x\/erc721"},{"key":"6_CR30","doi-asserted-by":"publisher","unstructured":"Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: Maurer, U.M. (ed.) EUROCRYPT\u201996. LNCS, vol.\u00a01070, pp. 387\u2013398. Springer, Heidelberg (May 1996). https:\/\/doi.org\/10.1007\/3-540-68339-9_33","DOI":"10.1007\/3-540-68339-9_33"},{"key":"6_CR31","unstructured":"Pornin, T.: Truncated EdDSA\/ECDSA signatures. Cryptology ePrint Archive, Report 2022\/938 (2022). https:\/\/eprint.iacr.org\/2022\/938"},{"key":"6_CR32","unstructured":"Ronen, E., Yogev, E.: SPHINCS+C: Compressing SPHINCS+ with (almost) no cost. Cryptology ePrint Archive, Report 2022\/778 (2022). https:\/\/eprint.iacr.org\/2022\/778"},{"key":"6_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1007\/978-3-642-29011-4_33","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2012","author":"Y Seurin","year":"2012","unstructured":"Seurin, Y.: On the exact security of schnorr-type signatures in the random oracle model. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 554\u2013571. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29011-4_33"},{"key":"6_CR34","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-030-92078-4_6","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6\u201310, 2021, Proceedings, Part III","author":"S Watanabe","year":"2021","unstructured":"Watanabe, S., Yasunaga, K.: Bit security as\u00a0computational cost for\u00a0winning games with\u00a0high probability. In: Tibouchi, M., Wang, H. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6\u201310, 2021, Proceedings, Part III, pp. 161\u2013188. Springer International Publishing, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92078-4_6"},{"key":"6_CR35","unstructured":"Wood, G.: Ethereum: A secure decentralized generalised transaction ledger (2021). https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-78679-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,15]],"date-time":"2025-02-15T09:30:17Z","timestamp":1739611817000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-78679-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031786785","9783031786792"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-78679-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"16 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Willemstad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cura\u00e7ao","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc24.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}