SoK: Design, vulnerabilities and defense of cryptocurrency wallets

Y Erinle, Y Kethepalli, Y Feng, J Xu - arXiv preprint arXiv:2307.12874, 2023 - arxiv.org
The rapid growth of decentralized digital currencies, enabled by blockchain technology, has
ushered in a new era of peer-to-peer transactions, revolutionizing the global economy …

A taxonomy of endpoint vulnerabilities and affected blockchain architecture layers

MAF Noor, K Mustafa - Concurrency and Computation: Practice …, 2024 - Wiley Online Library
Blockchain technology has gained significant attention and adoption due to its decentralized
nature, and promising secure and immutable transactions. The interpretation of Blockchain's …

IKE: Threshold Key Escrow Service with Intermediary Encryption

Y Yang, B Li, S Xiong, B Qin, Y Zhu, H Zheng… - … on Algorithms and …, 2023 - Springer
Blockchain has gained significant attention for its potential to revolutionize various fields.
The security of the blockchain system heavily relies on private key management, and …