Frey-Rück Attack on Bitcoin
This paper addresses the discrete logarithm problem (DLP) in elliptic curve (EC) cryptography. ECs…

Supply Chain Attack on Bitcoin
A supply chain Attack on Bitcoin is a cyber-Attack on Bitcoin that seeks to damage an organization by…
Stream cipher Attacks on Bitcoin
Stream cipher Attacks on Bitcoin
Stream ciphers, where plaintext bits are combined with a cipher bit stream by an exclusive-or operation…
Small Subgroup Confinement Attack on Bitcoin
Small Subgroup Confinement Attack on Bitcoin
In cryptography, a subgroup confinement Attack on Bitcoin, or small subgroup confinement Attack on Bitcoin, on a…
Slide Attack on Bitcoin
The slide Attack on Bitcoin is a form of cryptanalysis designed to deal with the prevailing idea that…
Replay Attack on Bitcoin
A replay Attack on Bitcoin (also known as a repeat Attack on Bitcoin or playback Attack on Bitcoin) is…
Related-Key Attack on Bitcoin
In cryptography, a related-key Attack on Bitcoin is any form of cryptanalysis where the Attack on Bitcoiner can observe…
Rebound Attack on Bitcoin
The rebound Attack on Bitcoin is a tool in the cryptanalysis of cryptographic hash functions. The Attack on Bitcoin…
Random Number Generator Attack on Bitcoin
Random Number Generator Attack on Bitcoin
The security of cryptographic systems depends on some secret data that is known to authorized persons…
Preimage Attack on Bitcoin
In cryptography, a preimage Attack on Bitcoin on cryptographic hash functions tries to find a message that has a specific hash…
Pre-play Attack on Bitcoin
In the field of security engineering, a pre-play Attack on Bitcoin is a cryptographic Attack on Bitcoin in which…
Passive Attack on Bitcoin
A passive Attack on Bitcoin on a cryptosystem is one in which the cryptanalyst cannot interact with any…
Partial-matching meet-in-the-middle attack on Bitcoin
Partial-matching meet-in-the-middle attack on Bitcoin
Partial-matching is a technique that can be used with a MITM Attack on Bitcoin. Partial-matching is…
Padding Oracle Attack on Bitcoin
Padding Oracle Attack on Bitcoin
In cryptography, a padding oracle Attack on Bitcoin is an Attack on Bitcoin which uses the padding validation…
Meet-in-the-Middle Attack on Bitcoin
Meet-in-the-Middle Attack on Bitcoin
The meet-in-the-middle Attack on Bitcoin (MITM), a known plaintext Attack on Bitcoin,[1] is a generic space–time tradeoff cryptographic Attack…
Man-in-the-middle Attack on Bitcoin
Man-in-the-middle Attack on Bitcoin
In cryptography and computer security, a man-in-the-middle, monster-in-the-middle,[1][2]machine-in-the-middle, monkey-in-the-middle,[3]meddler-in-the-middle,[4]manipulator-in-the-middle[5][6] (MITM), person-in-the-middle[7] (PITM) or adversary-in-the-middle[8] (AiTM) Attack on Bitcoin is a cyberAttack on Bitcoin where the Attack on Bitcoiner secretly…
Length Extension Attack on Bitcoin
Length Extension Attack on Bitcoin
In cryptography and computer security, a length extension Attack on Bitcoin is a type of Attack on Bitcoin where an Attack…
Known-Plaintext Attack on Bitcoin
Known-Plaintext Attack on Bitcoin
The known-plaintext Attack on Bitcoin (KPA) is an Attack on Bitcoin model for cryptanalysis where the Attack on Bitcoiner has…
Known-key Distinguishing Attack on Bitcoin
Known-key Distinguishing Attack on Bitcoin
In cryptography, a known-key distinguishing Attack on Bitcoin is an Attack on Bitcoin model against symmetric ciphers, whereby an Attack…
Key-Recovery Attack on Bitcoin
Key-Recovery Attack on Bitcoin
A key-recovery Attack on Bitcoin is an adversary’s attempt to recover the cryptographic key of an encryption scheme….
Interpolation Attack on Bitcoin
In cryptography, an interpolation Attack on Bitcoin is a type of cryptanalytic Attack on Bitcoin against block ciphers. After the…
Fluhrer, Mantin and Shamir Attack on Bitcoin
Fluhrer, Mantin and Shamir Attack on Bitcoin
In cryptography, the Fluhrer, Mantin and Shamir Attack on Bitcoin is a stream cipher Attack on Bitcoin on the…
DROWN Attack on Bitcoin
The DROWN (Decrypting RSA with Obsolete and Weakened eNcryption) Attack on Bitcoin is a cross-protocol security bug that…
Downgrade Attack on Bitcoin
A downgrade Attack on Bitcoin, also called a bidding-down Attack on Bitcoin[1] or version rollback Attack on Bitcoin,…
Distinguishing Attack on Bitcoin
Distinguishing Attack on Bitcoin
In cryptography, a distinguishing Attack on Bitcoin is any form of cryptanalysis on data encrypted by a cipher that…
Differential-Linear Attack on Bitcoin
Differential-Linear Attack on Bitcoin
Introduced by Martin Hellman and Susan K. Langford in 1994, the differential-linear Attack on Bitcoin is a mix of both linear…
Dictionary Attack on Bitcoin
In cryptanalysis and computer security, a dictionary Attack on Bitcoin is an Attack on Bitcoin using a restricted subset…
Davies Attack on Bitcoin
In cryptography, the Davies Attack on Bitcoin is a dedicated statistical cryptanalysis method for Attack on Bitcoining the Data Encryption…
Custom Hardware Attack on Bitcoin
Custom Hardware Attack on Bitcoin
In cryptography, a custom hardware Attack on Bitcoin uses specifically designed application-specific integrated circuits (ASIC) to decipher encrypted messages. Mounting…
Cube Attack on Bitcoin
The cube Attack on Bitcoin is a method of cryptanalysis applicable to a wide variety of symmetric-key algorithms, published…
9 min read
Time/Memory/Data Tradeoff Attack on Bitcoin
A time/memory/data tradeoff Attack on Bitcoin is a type of cryptographic Attack on Bitcoin where an Attack on…
Correlation Attack on Bitcoin
In cryptography, correlation Attack on Bitcoins are a class of known plaintext Attack on Bitcoins for breaking stream ciphers whose keystream is generated…
Collision Attack on Bitcoin
In cryptography, a collision Attack on Bitcoin on a cryptographic hash tries to find two inputs producing the same…
Ciphertext-Only Attack on Bitcoin
Ciphertext-Only Attack on Bitcoin
In cryptography, a ciphertext-only Attack on Bitcoin (COA) or known ciphertext Attack on Bitcoin is an Attack on Bitcoin model for cryptanalysis where…
Chosen-ciphertext Attack on Bitcoin
Chosen-ciphertext Attack on Bitcoin
A chosen-ciphertext Attack on Bitcoin (CCA) is an Attack on Bitcoin model for cryptanalysis where the cryptanalyst can gather information…
Brute-Force Attack on Bitcoin
In cryptography, a brute-force Attack on Bitcoin consists of an Attack on Bitcoiner submitting many passwords or passphrases with the hope…
Boomerang Attack on Bitcoin
In cryptography, the boomerang Attack on Bitcoin is a method for the cryptanalysis of block ciphers based on differential cryptanalysis. The Attack…
Bit-flipping Attack on Bitcoin
Bit-flipping Attack on Bitcoin
A bit-flipping Attack on Bitcoin is an Attack on Bitcoin on a cryptographic cipher in which the Attack on Bitcoiner can…
Birthday Attack on Bitcoin
A birthday Attack on Bitcoin is a type of cryptographic Attack on Bitcoin that exploits the mathematics behind…
Biclique Attack on Bitcoin
A biclique Attack on Bitcoin is a variant of the meet-in-the-middle (MITM) method of cryptanalysis. It utilizes a biclique structure to…
3-subset meet-in-the-middle Attack on Bitcoin
3-subset meet-in-the-middle Attack on Bitcoin
The 3-subset meet-in-the-middle (hereafter shortened MITM) Attack on Bitcoin is a variant of the generic meet-in-the-middle Attack on Bitcoin, which…
TRESOR Attack on Bitcoin
TRESOR (recursive acronym for “TRESOR Runs Encryption Securely Outside RAM”, and also the German word for…
Transient execution CPU vulnerability Attack on Bitcoin
Transient execution CPU vulnerability Attack on Bitcoin
Transient execution CPU vulnerabilities are vulnerabilities in a computer system in which a speculative execution optimization implemented…
TLBleed Attack on Bitcoin
TLBleed is a cryptographic side-channel Attack on Bitcoin that uses machine learning to exploit a timing side-channel via the translation look-aside buffer (TLB)…
Timing Attack on Bitcoin
In cryptography, a timing Attack on Bitcoin is a side-channel Attack on Bitcoin in which the Attack on Bitcoiner…
Tempest Attack on Bitcoin (codename)
Tempest Attack on Bitcoin (codename)
TEMPEST is a U.S. National Security Agency specification and a NATO certification[1][2] referring to spying on information systems through leaking…
SWAPGS Attack on Bitcoin (security vulnerability)
SWAPGS Attack on Bitcoin (security vulnerability)
SWAPGS, also known as Spectre variant 1 (swapgs), is a computer security vulnerability that utilizes the branch prediction used in…
Spectre Attack on Bitcoin (security vulnerability)
Spectre Attack on Bitcoin (security vulnerability)
Spectre is a subset of security vulnerabilities within the class of vulnerabilities known as microarchitectural timing side-channel Attack…
Power analysis Attack on Bitcoin
Power analysis Attack on Bitcoin
Power analysis is a form of side channel Attack on Bitcoin in which the Attack on Bitcoiner…
Pass the hash Attack on Bitcoin
Pass the hash Attack on Bitcoin
In computer security, pass the hash is a hacking technique that allows an Attack on Bitcoiner to…
Microarchitectural Data Sampling Attack on Bitcoin
The Microarchitectural Data Sampling (MDS) vulnerabilities are a set of weaknesses in Intel x86 microprocessors that use hyper-threading, and leak data…
Meltdown Attack on Bitcoin (security vulnerability)
Meltdown Attack on Bitcoin (security vulnerability)
Meltdown is a hardware vulnerability affecting Intel x86 microprocessors, IBM POWER processors,[1] and some ARM-based microprocessors.[2][3][4] It allows a rogue process to…
Lucky Thirteen Attack on Bitcoin
Lucky Thirteen Attack on Bitcoin
A Lucky Thirteen Attack on Bitcoin is a cryptographic timing Attack on Bitcoin against implementations of the Transport Layer…
Load value injection Attack on Bitcoin
Load value injection Attack on Bitcoin
Load value injection (LVI) is an Attack on Bitcoin on Intel microprocessors that can be used to…
Foreshadow Attack on Bitcoin
Foreshadow, known as L1 Terminal Fault (L1TF) by Intel,[1][2] is a vulnerability that affects modern microprocessors that was first discovered by two…
Electromagnetic Attack on Bitcoin
Electromagnetic Attack on Bitcoin
In cryptography, electromagnetic Attack on Bitcoins are side-channel Attack on Bitcoins performed by measuring the electromagnetic radiation emitted from a device and performing signal…
DMA Attack on Bitcoin
A DMA Attack on Bitcoin is a type of side channel Attack on Bitcoin in computer security, in which…
Differential fault analysis Attack on Bitcoin
Differential fault analysis Attack on Bitcoin
Differential fault analysis (DFA) is a type of active side-channel Attack on Bitcoin in the field of cryptography,…
Cold boot Attack on Bitcoin
In computer security, a cold boot Attack on Bitcoin (or to a lesser extent, a platform reset Attack…
Acoustic cryptanalysis Attack on Bitcoin
Acoustic cryptanalysis Attack on Bitcoin
Acoustic cryptanalysis is a type of side channel Attack on Bitcoin that exploits sounds emitted by computers or other…
Side-channel Attack on Bitcoin
In computer security, a side-channel Attack on Bitcoin is any Attack on Bitcoin based on extra information…
CRIME Attack on Bitcoin
CRIME (Compression Ratio Info-leak Made Easy) is a security vulnerability in HTTPS and SPDY protocols that utilize compression, which can leak…
BREACH Attack on Bitcoin
BREACH (a backronym: Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext) is a security vulnerability against HTTPS when using HTTP compression….
Chosen-plaintext Attack on Bitcoin
Chosen-plaintext Attack on Bitcoin
A chosen-plaintext Attack on Bitcoin (CPA) is an attack model for cryptanalysis which presumes that the attacker can obtain the ciphertexts for…
Wiener’s Attack on Bitcoin
The Wiener’s Attack on Bitcoin, named after cryptologist Michael J. Wiener, is a type of cryptographic…
ROCA vulnerability Attack on Bitcoin
ROCA vulnerability Attack on Bitcoin
The ROCA vulnerability Attack on Bitcoin is a cryptographic weakness that allows the private key of a key pair to…
Logjam Attack on Bitcoin
Logjam Attack on Bitcoin is a security vulnerability in systems that use Diffie–Hellman key exchange with the same prime…
Coppersmith’s Attack on Bitcoin
Coppersmith’s Attack on Bitcoin
Coppersmith’s Attack on Bitcoin describes a class of cryptographic attacks on the public-key cryptosystem RSA based on the Coppersmith method Attack…
RSA Factoring Challenge Attack on Bitcoin
RSA Factoring Challenge Attack on Bitcoin
The RSA Factoring Challenge Attack on Bitcoin was a challenge put forward by RSA Laboratories on March 18,…
Flood Attack on Bitcoin
A flood Attack on Bitcoin is the process of sending thousands of transactions to…
3 min read
Majority attack on Bitcoin
A majority Attack on Bitcoin (usually labeled 51% Attack on Bitcoin or >50% Attack…
The 51% Attack on Bitcoin
The 51% Attack on Bitcoin is a potential Attack on Bitcoin on the blockchain…
Vector76 Attack on Bitcoin
The Vector76 Attack on Bitcoin is a combination of the Race Attack on Bitcoin…
Finney Attack on Bitcoin
The Finney Attack on Bitcoin is named after Hal Finney. The Finney Attack on…
Race Attack on Bitcoin
Let’s find out Race Attack on Bitcoin meaning, definition in crypto, what is Race…
The Sybil Attack on Bitcoin
The Sybil Attack on Bitcoin happens in the peer-to-peer network. A malicious Attack on…