We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Wallet Security

00:00

Formal Metadata

Title
Wallet Security
Subtitle
How (not) to protect private keys
Title of Series
Number of Parts
Author
License
CC Attribution 4.0 International:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
There are multiple different ways to store cryptocurrency secret keys. This talk will investigate advantages and disadvantages of different methods with regards to cryptographic backdoors known as kleptograms.
Keywords
Semiconductor memoryInformation securityMusical ensembleInformation securityComputer animation
Information securityTelecommunicationChaos (cosmogony)Proof theoryContext awarenessChainCommunications protocolBlock (periodic table)CryptographyComputer virusInformation securityText editorBitComputer scienceSoftwareInformation technology consultingChainProjective planeRevision controlField (computer science)Point (geometry)Electronic mailing listBlock (periodic table)BlogDegree (graph theory)Lecture/ConferenceComputer animation
Database transactionKey (cryptography)ChainBlock (periodic table)Computer networkAddress spaceSign (mathematics)Term (mathematics)Parameter (computer programming)View (database)AlgorithmDatabase transactionBroadcasting (networking)Public-key cryptographyElectronic signatureAddress spaceSign (mathematics)SoftwareSheaf (mathematics)Group actionChainPoint (geometry)WaveMixed realityBlock (periodic table)BlogGame controllerEnterprise architectureComputer animation
AlgorithmEllipseElectronic signatureCurveTime evolutionModulo (jargon)Diskreter LogarithmusRSA (algorithm)Key (cryptography)Point (geometry)AdditionMultiplicationScalar fieldReverse engineeringFunction (mathematics)Hash functionSign (mathematics)ComputerFormal verificationSoftware testingChainAlgorithmElliptic curveOrder (biology)Category of beingWell-formed formulaBitPower (physics)Maxima and minimaModulo (jargon)ResultantInverse functionNumberEllipseRevision controlPublic-key cryptographyOperator (mathematics)Parameter (computer programming)CASE <Informatik>Electronic signatureInformation securityNumbering schemeAdditionPoint (geometry)SchlüsselverteilungHash functionDiskreter LogarithmusKey (cryptography)Element (mathematics)CurveRSA (algorithm)Multiplication signMessage passingInverse elementNoise (electronics)Data analysisDigitizingEquivalence relationFunctional (mathematics)Line (geometry)CollineationMultiplicationElectronic visual displayEmpirical distribution functionQuery languageGoodness of fitFamilyDiscrete groupHand fanSet (mathematics)WordOnline helpTournament (medieval)View (database)Endliche ModelltheorieDifferent (Kate Ryan album)NeuroinformatikFlagStandard deviationForestDemosceneComputer animation
SoftwareType theoryPublic-key cryptographyDifferent (Kate Ryan album)Computer animation
Type theorySoftwareServer (computing)LaptopControl flowKey (cryptography)Computer hardwareToken ringBackupModule (mathematics)Data storage deviceImplementationComputer hardwareImplementationSoftwareType theoryDatabase transactionRandom number generationSoftware bugRootElectronic signatureFirmwareLaptopControl flowData storage deviceEncryptionModule (mathematics)PlastikkarteBootingPasswordKey (cryptography)MiniDiscNeuroinformatikMalwareSoftware protection dongleSmartphoneGame controllerData managementNatural numberGame theoryDescriptive statisticsWindowElectric generatorGroup actionProjective planeVirtual machineElectronic visual displayServer (computing)Vector potentialWordShape (magazine)Electronic mailing listScripting languageEndliche ModelltheorieNP-hardTablet computer1 (number)Computer animation
PlastikkarteComputer hardwareKey (cryptography)Module (mathematics)ImplementationServer (computing)Information securityLaptopData storage deviceComputer networkMalwareComplete metric spaceSource codePlastikkartePlug-in (computing)Computer hardwareSoftwareWindowEmailServer (computing)Data storage deviceKey (cryptography)MalwareNatural numberSeries (mathematics)Virtual machineLink (knot theory)Neighbourhood (graph theory)LaptopModule (mathematics)Service (economics)Lecture/ConferenceComputer animation
Computer networkMalwareComputer hardwareNumberKey (cryptography)CollisionDeterminantChainNumberCASE <Informatik>NeuroinformatikBlock (periodic table)BlogPredictabilityElectronic signatureRandomizationWeb browserLecture/ConferenceComputer animation
Computer networkNumberMalwareComputer hardwareKey (cryptography)CollisionRandom numberElectric generatorCryptographyBackdoor (computing)Ring (mathematics)ChainDatabase transactionBlock (periodic table)NumberTablet computerGoogle Street ViewCryptographyMathematicsNatural numberOrder (biology)IntelChainParameter (computer programming)Factory (trading post)Point (geometry)Spherical capView (database)Key (cryptography)NeuroinformatikArchaeological field surveyService (economics)TwitterPort scanner1 (number)AlgorithmElectric generatorDuality (mathematics)Database transactionRandom number generationComputer fileBackdoor (computing)Multiplication signLecture/ConferenceComputer animation
Positional notationTerm (mathematics)NumberPoint (geometry)Logical constantRandom numberAxiom of choiceRing (mathematics)Electronic signatureFunction (mathematics)Computer programmingShape (magazine)Elliptic curveOrder (biology)Function (mathematics)Electric generatorWell-formed formulaFunctional (mathematics)Line (geometry)NumberRandom number generationReal numberPublic-key cryptographyElectronic signatureRandomizationPoint (geometry)NeuroinformatikBackdoor (computing)Classical physics2 (number)DampingData managementMathematicsNatural numberGateway (telecommunications)ChainEllipseInternetworkingCASE <Informatik>Roundness (object)BlogPosition operatorLecture/ConferenceComputer animation
Database transactionChainCommunications protocolBlock (periodic table)Database transactionInternetworkingBackdoor (computing)MathematicsChainBlock (periodic table)Computer animationXML
Database transactionChainCommunications protocolBlock (periodic table)Key (cryptography)Order (biology)Phase transitionPublic-key cryptographyElectronic signatureKey (cryptography)NeuroinformatikHacker (term)XMLComputer animation
DeterminismKey (cryptography)Database transactionIndependence (probability theory)ChainSimilarity (geometry)Block (periodic table)Communications protocolCategory of beingLimit (category theory)AlgorithmDatabase transactionPublic-key cryptographyIndependence (probability theory)Electronic signaturePoint (geometry)Communications protocolData miningKey (cryptography)Different (Kate Ryan album)Backdoor (computing)CurveMultiplication signStandard deviationMathematicsExpert systemParameter (computer programming)CASE <Informatik>Musical ensembleInteractive televisionObservational studyElectronic mailing listPoint cloudNeuroinformatikBlock (periodic table)Lecture/ConferenceComputer animation
Database transactionKey (cryptography)Mathematical analysisDatabase transactionRandom number generationNormal (geometry)Identical particlesKey (cryptography)Computer animation
Database transactionKey (cryptography)Mathematical analysisIntegrated development environmentElectronic signatureCartesian coordinate systemComputer hardwareSoftwareKey (cryptography)Contrast (vision)Computer animation
FingerprintAlgorithmDeterminismElectronic signatureLeakPerfect groupKey (cryptography)DiagramCurveEllipseCryptosystemIndependent set (graph theory)NumberSign (mathematics)Streaming media1 (number)Elektronisches MarketingComputer animationLecture/Conference
Derivation (linguistics)BitLeakPublic-key cryptographyKey (cryptography)Observational studyInformationNumbering schemeGame controllerLecture/Conference
CodeBitSource codeComputer hardwareSoftwareDatabase transactionExterior algebraPoint (geometry)Lecture/Conference
Random number generationPoint (geometry)MereologySlide ruleNumberPublic-key cryptographyNumbering schemeCommunications protocolMultiplication signStandard deviationMessage passingData managementLogarithmASCIIElectronic GovernmentTwitterLecture/Conference
2 (number)Vector spaceCASE <Informatik>AuthorizationLecture/Conference
CryptographySource codeForm (programming)InternetworkingModal logicLecture/Conference
FingerprintAlgorithmDeterminismElectronic signatureDiscrete groupLeakPerfect groupKey (cryptography)DiagramCurveEllipseCryptographyIndependent set (graph theory)Semiconductor memoryCartesian closed categoryKey (cryptography)Musical ensembleLecture/ConferenceComputer animation
Transcript: Englisch(auto-generated)