IOTA (technology)
IOTA | |
---|---|
Denominations | |
Plural | IOTAs |
Ticker symbol | IOTA, MIOTA |
Superunits | |
1,000,000 | Miota | Mi | MegaIota |
Development | |
White paper | Popov, Serguei (April 3, 2016). "April 3, 2016. Version 0.6" (PDF). |
Initial release | 11 July 2016 |
Code repository | https://github.com/iotaledger |
Source model | Open source |
Website | iota |
Ledger | |
Hash function | Kerl [keccak_384] |
Block explorer | thetangle |
Circulating supply | 2,779,530,283,277,761 |
Supply limit | 2,779,530,283,277,761 |
Search IOTA (technology) on Amazon.IOTA is an open-source distributed ledger designed for the Internet of things (IoT). IOTA is also referred to as a cryptocurrency.[1]
History[edit]
The IOTA ledger was created in 2015 by David Sønstebø, Dominik Schiener, Sergey Ivancheglo, and Serguei Popov.[2] Initial development was funded by an online public crowdsale, with the participants buying the IOTA value token with other digital currencies.[1] Approximately 1300 BTC were raised, corresponding to approximately 500,000 USD at that time, and the total token supply was distributed pro-rata over the initial investors. The IOTA network went live in 2016.[3]
IOTA foundation[edit]
In 2017, early IOTA token investors donated 5% of the total token supply for continued development and to endow what became later became the IOTA foundation.[1] In 2018, the IOTA Foundation was chartered as a Stiftung in Berlin, with the goal to assist in the research and development, education and standardisation of IOTA technology.[4] The IOTA foundation is a board member of International Association for Trusted Blockchain Applications (INATBA)[5], and founding member of the trusted-IoT alliance[6] and mobility open blockchain initiative (MOBI)[7], to promote blockchain and distributed ledgers in regulatory approaches, the IoT ecosystem and mobility.
Characteristics[edit]
The Tangle[edit]
The Tangle is the moniker used to describe IOTAs directed acyclic graph (DAG) transaction settlement and data integrity layer.[1] It is structured as a string of individual transactions that are interlinked to each other and stored through a network of node participants.[8] The Tangle does not have miners validating transactions, rather, network participants are jointly responsible for transaction validation, and must confirm two transactions already submitted to the network for every one transaction they issue.[9] As IOTA does not have miners to validate transactions, transactions can be issued to the network at no cost, facilitating micropayments.[9] To avoid spam, every transaction requires computational resources based on Proof of Work (PoW) algorithms, to find the answer to a simple cryptographic puzzle.[10] PoW can either be done locally on the device itself or externally via an IOTA node or a special API.[10]
IOTA supports both value and data transfers. To share, store, and retrieve encrypted data IOTA uses a second layer module, called Masked Authenticated Messaging (MAM).[10] This module encrypts messages (masking), confirms source origin (authentication), and creates a continuous message stream on the Tangle until the source stops publishing it (messaging).[10]
IOTA token[edit]
The IOTA token is a unit of value in the IOTA network.[11] There is a fixed supply of 2,779,530,283,277,761 iota tokens in circulation on the IOTA network. IOTA tokens are stored in IOTA wallets protected by an 81-character seed, similar to a password.[12] To access and spend the tokens, IOTA provides a cryptocurrency wallet.[13] A hardware wallet can be used to keep credentials offline while facilitating transactions.[14]
Coordinator Node[edit]
IOTA requires a majority of honest actors to prevent network attacks.[1] However, as the concept of mining does not exist on the IOTA network, it is unlikely that this requirement will always be met. Therefore, consensus is currently obtained through referencing of transactions issued by a special node operated by the IOTA foundation, called the coordinator.[15] The coordinator issues zero value transactions at given time intervals, called milestones.[15] Any transaction, directly or indirectly, referenced by such a milestone is considered valid by the nodes in the network.The coordinator is an authority operated by the IOTA foundation and as such single point of failure for the IOTA network, which makes the network highly centralized.[16]
Markets[edit]
IOTA is traded on digital currency exchanges such as Bitfinex[17], and listed under the MIOTA ticker symbol for the cryptocurrency. Like other digital currencies, IOTA’s token value has soared and fallen.[18] The token’s valuation fell back to $1 billion in early 2018 as a wider crypto rout sent currencies sinking.[19] In 2019 the IOTA token missed out entirely and was down on the year.[20]
Applications and testbeds[edit]
Proof-of-concepts building on IOTA technology are being developed in the automotive and IoT industry by corporates as Volkswagen and Bosch.[18][19] IOTA is applied in smart city testbeds, including development of community grids and local trade of energy.[21] Jaguar Land Rover is testing software that will allow drivers of its cars to earn the IOTA cryptocurrency as a reward for sharing data.[22][23] In project Alvarium, formed under the Linux Foundation, IOTA is used as an immutable storage and validation mechanism.[24][25] STMicroelectronics has provided IOTA middleware for their STM32-based boards.[26]
On February 11, 2020, the Eclipse Foundation and IOTA Foundation jointly launched the Tangle EE (Enterprise Edition) Working Group.[27] Tangle EE is aimed at enterprise users that can take IOTA technology and enable larger organizations to build applications on top of the project, where the Eclipse Foundation will provide a vendor-neutral governance framework .[28]
IOTA foundation has faced criticism in response to their announcements of partnerships. In 2017, IOTA released the data marketplace, a pilot for a market where connected sensors or devices can store, sell or purchase data.[29][30] The cryptocurrency community was critical towards the announcement of the data marketplace over the extent of the involvement of the participants of the data marketplace.[31] Izabelle Kaminska criticized the Jaguar press release, as "the impact of the release across the media space was decidedly one presenting the service as a fait accompli", and "our interpretation is that it's very unlikely Jaguar will be bringing a smart-wallet-enabled earn-cryptocurrency-as-you-drive offering to the marketplace any time soon."[32]
Vulnerabilities and attacks[edit]
DCI Curl-P-27 vulnerability disclosure[edit]
On September 8th, 2017, researchers Ethan Heilman, Neha Nerula et al. from MIT's Digital Currency Initiative (DCI) reported on potential security flaws with IOTA's Curl-P-27 hash function.[33] The authors were able to quickly create messages of the same length which hash to the same value with Curl-P-27, breaking the function’s collision resistance. Using this collision attack, they could generate signature forgeries in IOTA.[33] In response to the disclosure, the IOTA Foundation changed the hash function in the node reference implementation from Curl-P-27 to Kerl (a trinary adaption of SHA-3) on August 7th 2017.[34] According to IOTA cofounder Sergey Ivancheglo, the DCI found the protocol's purposefully placed form of copy protection.[33][35] The “practical attack” demonstrated by the DCI researchers only works in a limited number of improbable situations that would affect a negligible number of IOTA users, mostly thanks to a closed-source and centralized solution called the “Coordinator” that helps secure the network.[34]
The IOTA foundation received considerable backlash in their handling of the incident.[34] FT Alphaville reported legal posturing by an IOTA Founder against a security researcher for his involvement in the DCI report, as well as instances of aggressive language levelled against a Forbes contributor and other unnamed journalists covering the DCI report.[35] The Center for Blockchain Technologies at the University College London severed ties with the IOTA Foundation in late April 2018 due to the alleged legal threats against security researchers involved in the report.[36]
Former MIT media lab director, Joi Ito raised flags about the IOTA management team saying that IOTA's Sergey Ivancheglo gave “two conflicting explanations” for the security bug.[37] Multicoin capital co-founder Kyle Samani wrote that IOTA has “one of the worst mgmt teams in crypto.”[37]
Dan Guido, CEO from Trail of Bits said “DCI made some rookie mistakes too, and this is generally why, in other industries, security researchers will hand off bugs to a vulnerability coordinator, like a CERT, to report on their behalf”.[38] Venture Capitalist Jamie Burke told, “IOTA has issues, largely around their communications, but we believe in the vision and we believe in the innovation”.[19]
13 or M attack and reclaim[edit]
In October 2017, after the IOTA developers transitioned from using Curl-P-27 to using Kerl, an unrelated vulnerability called the 13 or M attack was discovered, a bug that put the IOTA tokens of certain users at risk by partially revealing a portion of the private key generated for specific addresses.[33] This would have made it easier for malicious attackers to potentially “brute force” hack the remainder of those addresses’ private keys and thereby steal the tokens.[33] The IOTA Foundation patched this vulnerability by requiring that if a message hash to be signed includes a 13, then the user must alter the message until no 13s are present in the digest.[33] As an additional remediation step, the IOTA developers transferred potentially compromised funds to addresses under its control, providing a process for users to later apply to the IOTA Foundation in order to reclaim their funds[33]
Seed-generator scam[edit]
On Januari 2018 more than 10 million USD worth of IOTA tokens were stolen from users that used an online seed-creator, a password that protects their ownership of IOTA tokens.[13] The seed-generator scam was the largest fraud in IOTA history to date, with several hundred people affected.[39] One year later, in Januari 2019, the UK and German law enforcement agencies arrested a 36-year old man from Oxford, England.[12] Matthias Krekeler, of the State Criminal Police in Hesse, said the arrest was only possible thanks to the "sophisticated collaboration of international authorities", and the investigation had been helped by "IOTA community members".[40]
Trinity wallet attack incident[edit]
On November 26, 2019 a hacker discovered a vulnerability in Trinity, a mobile and desktop wallet managed by the IOTA foundation.[41] The attacker compromised over 50 IOTA seeds, resulting in the theft of approximately 2 Million USD worth in IOTA tokens.[41] The attack vector was opened via integration of a third party payment service, called MoonPay.[41] The attacker was able to intercept DNS queries with a compromised Cloudflare API key, and managed to have his own malicious version rolled out instead of the third-party code.[41] On February 10, 2020 MoonPay noticed the hack, resolved the vulnerability in its API, yet did not disclose the hack to the community.[41] With the route of attack now gone, the hacker started clearing the funds from the 50 compromised seeds on February 11, 2020.[41] After receiving reports that hackers were stealing funds from user wallets, the IOTA Foundation shut down the coordinator, a node in the IOTA network that puts the final seal of approval on any IOTA currency transaction, on February 12, 2020.[42] The never-before-seen move was meant to prevent hackers from executing new thefts, but also had the side-effect of effectively shutting down the entire IOTA cryptocurrency.[42]
As the hack may have affected any user of the desktop versions of Trinity who opened the wallet between December 17 and February 17, the IOTA Foundation presented a 10-day seed migration period before restarting the coordinator.[41] Users at-risk are given seven days two migrate their potentially compromised seed to a new seed, until March 7, 2020. The seed-migration is followed by two days of community validation of the ledger state in case of a conflict, and a restart of the coordinator on March 10, 2020.[43]
Criticism[edit]
IOTA promises to achieve the same benefits that blockchain-based DLTs bring - decentralization, distribution, immutability and trust - but remove the downsides of wasted resources associated with mining as well as transaction costs.[1] However, several of the design features of IOTA are unusual, and it is unclear whether they work in practice.[44][16][33]
Network consensus and Coordinator node[edit]
The security of IOTA's consensus mechanism against double-spending attacks is unclear, as long as the network is immature.[8] Essentially, in the IoT, with heterogeneous devices having varying levels of low computational power, sufficiently strong computational resources will render the tangle insecure.[8] This is a problem in traditional proof-of-work blockchains as well, however, they provide a much greater degree of security through higher fault tolerance and transaction fees.[8] At the beginning, when there is a lower number of participants and incoming transactions, a central coordinator is needed to prevent an attack on the IOTA tangle.[8]
Critics have opposed role of the coordinator for being the single source of consensus in the IOTA network. Polychain Capital founder Carlson-Wee, says “IOTA is not decentralized, even though IOTA makes that claim, because it has a central “coordinator node” that the network needs to operate. If a regulator or a hacker shut down the coordinator node, the network would go down.”[37] , During the Trinity attack incident, the IOTA foundation shutdown the coordinator to prevent further thefts, thereby demonstrating that the network is not decentralized in its current state.[41][45][16] Last year the IOTA Foundation announced that it would like to operate the network without a coordinator in the future, but implementation of this is still in an early development phase.[41][16]
Quantum resistance and address re-use[edit]
IOTA is resistant against quantum computer attacks, due to its use of the Winternitz One Time Signature (WOTS) scheme, which is quantum resistant.[46] Due to IOTA’s choice of one-time signature scheme, spending from an address multiple times drastically reduces the security of the funds at that address, because it exposes portions of the private key associated with the address.[46]
Stolen funds due to the 13 or M attack were initially suspected to be the result of address reuse, only later to be identified as a result of a broken key derivation function, found Willem Pinckaers, a researcher of security firm Lekkertech.[47]
Ternary implementation[edit]
For potential efficiency reasons, IOTA's data structures uses a balanced ternary implementation; instead of bits, it uses trits (−1, 0, 1).[33] With all existing hash designs being binary, a ternary prototype called Curl-P had been developed, instead of the well-studied alternatives that underpin other digital coins.[34] However, efficient cryptanalytic attacks on Curl-P have been devised, implying that it cannot be considered a strong cryptographic hash function.[48] After vulnerabilities were detected in Curl-P, the hashing algorithm was changed to Kerl, which is considered safe.[34] However, as a binary design Kerl is not inherently suitable for direct implementation on ternary platforms and a drop-in replacement, called Troika, is currently developed.[49][48]
Network maturity[edit]
IOTA has seen several network outages as a result of bugs in the coordinator as well as DDoS attacks.[50][1] During the seed generator scam, a DDoS network attack was abused leaving initial thefts undetected.[39]
References[edit]
- ↑ 1.0 1.1 1.2 1.3 1.4 1.5 1.6 Anadiotis, George (2017-11-30). "A better blockchain: Bitcoin for nothing and transactions for free?". ZDNet. Retrieved 2020-01-15. Unknown parameter
|url-status=
ignored (help) - ↑ Kahl, Stephan (2018-03-07). "22-Year-Old Behind $5 Billion Crypto Is Just Getting Started". Bloomberg. Unknown parameter
|url-status=
ignored (help) - ↑ Chavez-Dreyfuss, Gertrude (2017-11-28). "Blockchain network IOTA teams up with Microsoft, others on data marketplace". Reuters. Retrieved 2020-01-15. Unknown parameter
|url-status=
ignored (help) - ↑ "IOTA: Erste Krypto-Stiftung Deutschlands gegründet". DIE STIFTUNG (in Deutsch). 2017-11-15. Retrieved 2020-01-15.
- ↑ O'Brien, Chris (2019-04-03). "EU launches blockchain association to accelerate distributed ledger technology adoption". VentureBeat. Retrieved 2020-01-17. Unknown parameter
|url-status=
ignored (help) - ↑ Osborne, Charlie (2017-09-19). "New alliance advocates the blockchain to improve IoT security, trust". ZDNet. Retrieved 2020-01-17. Unknown parameter
|url-status=
ignored (help) - ↑ Russel, Jon (2018-05-02). "BMW, GM, Ford and Renault launch blockchain research group for automotive industry". TechCrunch. Retrieved 2020-02-01. Unknown parameter
|url-status=
ignored (help) - ↑ 8.0 8.1 8.2 8.3 8.4 Ali, Muhammad Salek; Vecchio, Massimo; Pincheira, Miguel; Dolui, Koustabh; Antonelli, Fabio; Rehmani, Mubashir Husain (2018-12-18). "Applications of Blockchains in the Internet of Things: A Comprehensive Survey". IEEE Communications Surveys & Tutorials. 21 (2): 1676–1717. doi:10.1109/COMST.2018.2886932. ISSN 1553-877X.
- ↑ 9.0 9.1 Makhdoom, Imran; Abolhasan, Mehran; Abbas, Haider; Ni, Wei (2019-01-01). "Blockchain's adoption in IoT: The challenges, and a way forward". Journal of Network and Computer Applications. 125: 251–279. doi:10.1016/j.jnca.2018.10.019.
- ↑ 10.0 10.1 10.2 10.3 Hawig, David; Zhou, Chao; Fuhrhop, Sebastian; Fialho, Andre S; Ramachandran, Navin (2019-06-14). "Designing a Distributed Ledger Technology System for Interoperable and General Data Protection Regulation–Compliant Health Data Exchange: A Use Case in Blood Glucose Data". Journal of Medical Internet Research. 21 (6): e13665. doi:10.2196/13665. ISSN 1438-8871. PMC 6595943 Check
|pmc=
value (help). PMID 31199293. - ↑ Marcel Rosenbach, Alexander Jung, Frank Dohmen (2018-01-22). "Kryptowährung: Bitcoin geht, Blockchain bleibt". www.spiegel.de (in Deutsch). Retrieved 2020-01-15. Unknown parameter
|url-status=
ignored (help)CS1 maint: Multiple names: authors list (link) - ↑ 12.0 12.1 Chavez-Dreyfuss, Gertrude (2019-01-30). "IOTA says bulk of $11 million stolen tokens found, hacker worked alone". Reuters. Retrieved 2020-01-15. Unknown parameter
|url-status=
ignored (help) - ↑ 13.0 13.1 Marcel Rosenbach, Markus Böhm (2018-01-30). "Betrugsmaschen bei Kryptowährungen: Auf einmal ist alles weg". www.spiegel.de (in Deutsch). Retrieved 2020-01-15. Unknown parameter
|url-status=
ignored (help) - ↑ Chavez-Dreyfuss, Gertrude (2019-01-30). "IOTA says bulk of $11 million stolen tokens found, hacker worked alone". Reuters. Retrieved 2020-01-15. Unknown parameter
|url-status=
ignored (help) - ↑ 15.0 15.1 Cao, Bin; Li, Yixin; Zhang, Lei; Zhang, Long; Mumtaz, Shahid; Zhou, Zhenyu; Peng, Mugen (2019-07-10). "When Internet of Things Meets Blockchain: Challenges in Distributed Consensus". IEEE Network. 33 (6): 133–139. arXiv:1905.06022. Bibcode:2019arXiv190506022C. doi:10.1109/MNET.2019.1900002. ISSN 1558-156X.
- ↑ 16.0 16.1 16.2 16.3 Mix (2019-05-28). "IOTA wants to ditch its most centralized component, but the timeline is still murky". Hard Fork | The Next Web. Retrieved 2020-01-17.
- ↑ Cheng, Evelyn (2017-06-14). "Major bitcoin exchanges hit by cyberattacks as record rally makes them a target". CNBC. Retrieved 2020-01-17.
- ↑ 18.0 18.1 "New ways to trade data, New ways to trade data". The Economist. 2018-03-28. ISSN 0013-0613. Retrieved 2020-01-15. Unknown parameter
|url-status=
ignored (help) - ↑ 19.0 19.1 19.2 Smith, Oliver (2018-08-16). "How Next Generation Crypto Investors Are Poised To Win, Even If Their Startups Lose". Forbes. Retrieved 2020-01-15. Unknown parameter
|url-status=
ignored (help) - ↑ Kharif, Olga (2019-05-14). "Bitcoin Adds Market Share in Recovery in Crypto Prices". Bloomberg. Retrieved 2020-01-18. Unknown parameter
|url-status=
ignored (help) - ↑ O'Brien, Chris (2019-08-30). "Norway unveils energy-positive building showcasing smart city potential". VentureBeat. Retrieved 2020-01-17. Unknown parameter
|url-status=
ignored (help) - ↑ O'Grady, Sean (2019-05-03). "Mobile piggy bank: Jaguar Land Rover's 'earn as you drive' concept". The Independent. Retrieved 2020-01-17. Unknown parameter
|url-status=
ignored (help) - ↑ Chavez-Dreyfuss, Gertrude (2019-04-29). "Jaguar Land Rover planning to allow helpful car drivers to earn cryptocurrency". Reuters. Retrieved 2020-01-19. Unknown parameter
|url-status=
ignored (help) - ↑ Bantle, Ulrich (2019-10-31). "Linux Foundation gründet Data-Privacy-Projekt Alvarium". Linux-Magazin (in Deutsch). Retrieved 2020-01-25.
- ↑ Agelini, Chris (2020-01-23). "How open, trusted edge can help improve data sharing and monetization". VentureBeat. Retrieved 2020-01-25. Unknown parameter
|url-status=
ignored (help) - ↑ Arnold, Heinz (2019-07-01). "STMicroelectronics: IOTA Middleware for STM32 Boards". www.elektroniknet.de. Retrieved 2020-01-18. Unknown parameter
|url-status=
ignored (help) - ↑ McKendrick, Joe. "Enter the Tangle, a blockchain designed specially for the Internet of Things". ZDNet. Retrieved 2020-02-29.
- ↑ Miller, Ron (2020-02-11). "Tangle EE project joins Eclipse Foundation to bring distributed ledger apps to enterprise". TechCrunch. Retrieved 2020-02-29. Unknown parameter
|url-status=
ignored (help) - ↑ Ponciano, Jonathan. "IOTA Foundation Launches Data Marketplace For 'Internet-Of-Things' Industry". Forbes. Retrieved 2020-01-18.
- ↑ "IOTA launches IoT data marketplace, envisions devices autonomously buying and trading information". VentureBeat. 2017-11-28. Retrieved 2020-01-15.
- ↑ Mix (2017-12-12). "IOTA clarifies it has no formal partnership with Microsoft [UPDATED]". Hard Fork | The Next Web. Retrieved 2020-01-15.
- ↑ Kaminska, Izabella (2019-05-28). "Emperor has no clothes, Jaguar crypto press release edition". FT Alphaville. Unknown parameter
|url-status=
ignored (help) - ↑ 33.0 33.1 33.2 33.3 33.4 33.5 33.6 33.7 33.8 Heilman, Ethan; Narula, Neha; Tanzer, Garrett; Lovejoy, James; Colavita, Michael; Virza, Madars; Dryja, Tadge (2019). "Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency".
- ↑ 34.0 34.1 34.2 34.3 34.4 Daniel Oberhaus & Jordan Pearson (2018-03-02). "A $5 Billion Cryptocurrency Has Enraged Cryptographers". Vice. Retrieved 2020-01-21. Unknown parameter
|url-status=
ignored (help) - ↑ 35.0 35.1 Kelly, Jemima (2018-08-25). "FUD, inglorious FUD". ftalphaville.ft.com. Retrieved 2020-01-21. Unknown parameter
|url-status=
ignored (help) - ↑ Mix (2018-04-28). "University College London (UCL) severs ties with IOTA Foundation". Hard Fork | The Next Web. Retrieved 2020-01-18.
- ↑ 37.0 37.1 37.2 Kauflin, Jeff (2018-01-03). "IOTA Rose 464% In 2017, But Buyer Beware: Experts Have Major Security Concerns". Forbes. Archived from the original on 7 August 2019. Retrieved 7 August 2019. Unknown parameter
|url-status=
ignored (help) - ↑ Peck, Morgen. "Cryptographers Urge People to Abandon IOTA After Leaked Emails". IEEE Spectrum: Technology, Engineering, and Science News. Retrieved 2020-01-22. Unknown parameter
|url-status=
ignored (help) - ↑ 39.0 39.1 Cimpanu, Catalin. "Europol arrests UK man for stealing €10 million worth of IOTA cryptocurrency". ZDNet. Retrieved 2020-01-15.
- ↑ "Oxford man arrested over £8.7m cryptocurrency theft". BBC News. 2019-01-23. Retrieved 2020-01-17. Unknown parameter
|url-status=
ignored (help) - ↑ 41.0 41.1 41.2 41.3 41.4 41.5 41.6 41.7 41.8 Kannenberg, Axel (2020-02-27). "IOTA cryptocurrency: Million dollar credit stolen, no payments possible (translated)". heise online. Retrieved 2020-03-04. Unknown parameter
|url-status=
ignored (help) - ↑ 42.0 42.1 Cimpanu, Catalin. "IOTA cryptocurrency shuts down entire network after wallet hack". ZDNet. Retrieved 2020-02-29.
- ↑ Kannenberg, Axel (2020-03-02). "Nach Trinity-Hack: IOTA stellt Migrationstool für kompromittierte Seeds bereit". heise online (in Deutsch). Retrieved 2020-03-08. Unknown parameter
|url-status=
ignored (help) - ↑ Evans, Jon (2018-08-10). "Cryptocurrency insecurity: IOTA, BCash and too many more". TechCrunch. Retrieved 2020-01-26. Unknown parameter
|url-status=
ignored (help) - ↑ Kauflin, Jeff (2018-01-03). "IOTA Rose 464% In 2017, But Buyer Beware: Experts Have Major Security Concerns". Forbes. Archived from the original on 7 August 2019. Retrieved 7 August 2019. Unknown parameter
|url-status=
ignored (help) - ↑ 46.0 46.1 Sarfraz, Umair; Alam, Masoom; Zeadally, Sherali; Khan, Abid (2019-01-15). "Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions". Computer Networks. 148: 361–372. doi:10.1016/j.comnet.2018.11.019. ISSN 1389-1286.
- ↑ "IOTA Signatures, Private Keys and Address Reuse? - Lekkertech". blog.lekkertech.net. Retrieved 2020-01-26.
- ↑ 48.0 48.1 Kölbl, Stefan; Tischhauser, Elmar; Derbez, Patrick; Bogdanov, Andrey (2019-08-27). "Troika: a ternary cryptographic hash function". Designs, Codes and Cryptography. 88 (1): 91–117. doi:10.1007/s10623-019-00673-2. ISSN 0925-1022.
- ↑ Beedham, Matthew (2018-12-20). "IOTA is dishing out shares of $220K bounty — if you can crack its new hash function". Hard Fork | The Next Web. Retrieved 2020-01-26.
- ↑ Williams-Grut, Oscar (2018-02-09). "The 22-year-old founder of a cryptocurrency worth $5 billion tells us what it's like to run a crypto company as the market goes wild". Business Insider Nederland. Retrieved 2020-01-19. Unknown parameter
|url-status=
ignored (help)
External links[edit]
IOTA[edit]
This article "IOTA (technology)" is from Wikipedia. The list of its authors can be seen in its historical and/or the page Edithistory:IOTA (technology). Articles copied from Draft Namespace on Wikipedia could be seen on the Draft Namespace of Wikipedia and not main one.