scholarly journals A Small Subgroup Attack on Bitcoin Address Generation

Mathematics ◽  
2020 ◽  
Vol 8 (10) ◽  
pp. 1645
Author(s):  
Massimiliano Sala ◽  
Domenica Sogiorno ◽  
Daniele Taufer

We show how a small subgroup confinement-like attack may be mounted on the Bitcoin addresses generation protocol, by inspecting a special subgroup of the group associated to point multiplication. This approach does not undermine the system security but highlights the importance of using fair random sources during the private key selection.


1980 ◽  
Vol 19 (03) ◽  
pp. 162-164 ◽  
Author(s):  
Rachel Harris ◽  
W. Margaret ◽  
Kathleen Hunter

The recall rate of patients’ family medical histories was studied in 200 cancer and non-cancer patients. Data on age and cause of death for parents and grandparents were collected. Although most patients knew the age and cause of death of parents, less than half knew for grandparents. Cancer patients had significantly greater recall for maternally related relatives. A subsample of patients’ family medical histories was compared to death certificate data. Patients’ reports were found to be highly inaccurate. Since only a small subgroup could provide medical history data for grandparents, the generaliz-ability for history of family illness is questioned.



2015 ◽  
Author(s):  
Alfredo Cruz ◽  
Jeff Duffany ◽  
Alexander Lopez
Keyword(s):  


Author(s):  
Bassam A. Hemade ◽  
Hamed A. Ibrahim ◽  
Hossam E.A. Talaat

Background: The security assessment plays a crucial role in the operation of the modern interconnected power system network. Methods: Hence, this paper addresses the application of k-means clustering algorithm equipped with Principal Component Analysis (PCA) and silhouette analysis for the classification of system security states. The proposed technique works on three principal axes; the first stage involves contingency quantification based on developed insecurity indices, the second stage includes dataset preparation to enhance the overall performance of the proposed method using PCA and silhouette analysis, and finally the application of the clustering algorithm over data. Results: The proposed composite insecurity index uses available synchronized measurements from Phasor Measurement Units (PMUs) to assess the development of cascading outages. Considering different operational scenarios and multiple levels of contingencies (up to N-3), Fast Decoupled Power Flow (FDPF) have been used for contingency replications. The developed technique applied to IEEE 14-bus and 57-bus standard test system for steady-state security evaluation. Conclusion: The obtained results ensure the robustness and effectiveness of the established procedure in the assessment of the system security irrespective of the network size or operating conditions.



Sign in / Sign up

Export Citation Format

Share Document