# ECDSA Security in Bitcoin and Ethereum : a Research Survey

@inproceedings{Mayer2016ECDSASI, title={ECDSA Security in Bitcoin and Ethereum : a Research Survey}, author={Hartwig und Paola Mayer}, year={2016} }

This survey discusses the security level of the signature scheme implemented in Bitcoin and Ethereum.

## 58 Citations

### Bitcoin security with a twisted Edwards curve

- Computer Science, MathematicsJournal of Discrete Mathematical Sciences and Cryptography
- 2020

It is shown that Bitcoin is more secure and more efficient with the digital signature algorithm Ed25519 and the twisted Edwards curve CurveEd25519.

### A Survey on Efficient and Secure Implementation of ECDSA against Fault Attack

- Computer Science, MathematicsInternational Journal of Emerging Trends in Engineering Research
- 2020

A precise and complete review of an update of the Elliptic Curve Digital Signature (ECDSA) algorithm and fault attack and its countermeasures and describes about the future work to be done are presented.

### Efficient and Secure ECDSA Algorithm and its Applications: A Survey

- Computer ScienceInt. J. Commun. Networks Inf. Secur.
- 2019

A comprehensive survey of an update of the ECDSA algorithm in terms of performance, security, and applications is presented.

### Post quantum identity authentication mechanism in blockchain

- Computer ScienceICCIP
- 2022

An identity based post quantum authentication system applicable to the blockchain, which provides anti quantum protection and eliminates the dependence on public key certificates is considered.

### Ethereum Transactions and Smart Contracts among Secure Identities

- Computer Science, MathematicsDLT@ITASEC
- 2019

This paper solves the limitation of the current Blockchains by integrating Public Digital Identity with Ethereum via Identity-Based-Encryption (IBE), and shows that it does not require additional trust w.r.t. that necessary for IBE and Public Digital identity systems.

### A Survey on the Security of Blockchain Systems

- Computer Science, MathematicsFuture Gener. Comput. Syst.
- 2020

### Security Assessment of Authentication and Authorization Mechanisms in Ethereum, Quorum, Hyperledger Fabric and Corda

- Computer Science
- 2019

A general threat model for blockchain authentication and authorization schemes and assess the security of each platform with regard to this model is defined and hardening guidelines are provided in order to help users prevent the stated vulnerabilities when possible.

### Efficient Blockchain System based on Proof of Segmented Work

- Computer Science2020 IEEE Region 10 Symposium (TENSYMP)
- 2020

This work proposes a system (FaircoinBD) where the focus on reducing energy consumption by limiting participation, increasing propagation speed and fair reward distribution, and compared it with Bitcoin and Ether in terms of energy consumption.

### Security on Blockchain Technology

- Computer Science2020 3rd International Conference on Advanced Communication Technologies and Networking (CommNet)
- 2020

This paper provides an overview of BC security, starting with the basics of BC technology, and gives the primary BC security attacks and the BC countermeasures.

### Novel Method for Handling Ethereum Attack

- Computer ScienceSSRN Electronic Journal
- 2019

Ethereum, a leading block chain, is considered and the current approach is compared against a novel approach providing a security and scaling solution, which helps safe guard block chain projects, making them safer and chain agnostic.

## References

SHOWING 1-10 OF 20 REFERENCES

### Elliptic Curve Cryptography in Practice

- Computer Science, MathematicsFinancial Cryptography
- 2014

It is found that despite the high stakes of money, access and resources protected by ECC, implementations suffer from vulnerabilities similar to those that plague previous cryptographic systems.

### ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels

- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2016

We show that elliptic-curve cryptography implementations on mobile devices are vulnerable to electromagnetic and power side-channel attacks. We demonstrate full extraction of ECDSA secret signing…

### High-speed high-security signatures

- Computer Science, MathematicsJournal of Cryptographic Engineering
- 2012

This paper shows that a $390 mass-market quad-core 2.4GHz Intel Westmere (Xeon E5620) CPU can create 109000 signatures per second and verify 71000 signatures per second on an elliptic curve at a 2128…

### Guide to Elliptic Curve Cryptography

- Computer ScienceSpringer Professional Computing
- 2004

This guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment, as well as side-channel attacks and countermeasures.

### How to manipulate curve standards: a white paper for the black hat

- Computer Science, EconomicsIACR Cryptol. ePrint Arch.
- 2014

This paper analyzes the cost of breaking ECC under the following assumptions: (1) ECC is using a standardized elliptic curve that was actually chosen by an attacker; (2) the attacker is aware of a…

### Recent progress on the elliptic curve discrete logarithm problem

- Mathematics, Computer ScienceDes. Codes Cryptogr.
- 2016

We survey recent work on the elliptic curve discrete logarithm problem. In particular we review index calculus algorithms using summation polynomials, and claims about their complexity.

### Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms

- Mathematics, Computer ScienceCRYPTO
- 2001

A new method for accelerating this operation on classes of elliptic curves that have efficiently-computable endomorphisms is described, applicable to a larger class of curves than previous such methods.

### Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves

- Mathematics, Computer ScienceJournal of Cryptology
- 2010

This work gives detailed implementation results which show that the Gallant–Lambert–Vanstone method for elliptic curve point multiplication on general curves runs in between 0.70 and 0.83 the time of the previous best methods.

### Elliptic Curves: Number Theory and Cryptography

- Mathematics, Computer Science
- 2003

This book discusses Elliptic Curve Cryptography, a Cryptosystem Based on Factoring and its Applications, and some of the techniques used to develop such systems.

### Four-Dimensional Gallant–Lambert–Vanstone Scalar Multiplication

- Computer Science, MathematicsJournal of Cryptology
- 2012

Two implementations of the merged GLV–GLS approach improve the state-of-the-art performance of scalar multiplication on elliptic curves over large prime characteristic fields for a variety of scenarios including side-channel protected and unprotected cases with sequential and multicore execution.