Speed Optimizations in Bitcoin Key Recovery Attacks

@article{Courtois2016SpeedOI,
  title={Speed Optimizations in Bitcoin Key Recovery Attacks},
  author={Nicolas Courtois and Guangyan Song and Ryan Castellucci},
  journal={IACR Cryptology ePrint Archive},
  year={2016},
  volume={2016},
  pages={103}
}
In this paper we study and give the first detailed benchmarks on existing implementations of the secp256k1 elliptic curve used by at least hundreds of thousands of users in Bitcoin and other cryptocurrencies. Our implementation improves the state of the art by a factor of 2.5, with focus on the cases where side channel attacks are not a concern and a large quantity of RAM is available. As a result, we are able to scan the Bitcoin blockchain for weak keys faster than any previous implementation… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-10 of 12 references

Guide to Elliptic Curve Cryptography

Springer Professional Computing • 2004
View 13 Excerpts
Highly Influenced

bitcoin secp256k1 library, version 2015/08/11

P. Wuille
1999
View 5 Excerpts
Highly Influenced

Bitcoin: A peer-to-peer electronic cash system

S. Nakamoto
Consulted, • 2012
View 1 Excerpt

Weierstraß Elliptic Curves and Side-Channel Attacks

Public Key Cryptography • 2002
View 2 Excerpts

Sec 2: Recommended elliptic curve domain parameters

S. Certicom
Proceeding of Standards for Efficient Cryptography, Version, • 2000
View 2 Excerpts

Similar Papers

Loading similar papers…