You are here |
www.pl-enthusiast.net | ||
| | | |
keymaterial.net
|
|
| | | | One weird hobby of mine is reasonable properties of cryptographic schemes that nobody promised they do or don't have. Whether that's invisible salamanders or binding through shared secrets, anything that isn't just boring IND-CCA2 or existential unforgeability is just delightful material to construct vulnerabilities with. Normally, with a signature scheme, you have the public key... | |
| | | |
blog.quarkslab.com
|
|
| | | | The Tari Labs mandated Quarkslab to perform a cryptographic and security assessment of the dalek libraries. One of the Tari Labs' projects is to implement the Tari protocol, a decentralised assets protocol. It relies on some of the dalek libraries, especially the cryptographic primitives, provided by subtle and curve25519-dalek. Moreover, the use of Bulletproofs [6], and its implementation by the authors of the dalek libraries, will allow them to enable efficient confidential transactions on the blockchain in a near future. We only found some minor issues. We also provided recommendations on the usage of the libraries and third-party libraries. | |
| | | |
www.yodaiken.com
|
|
| | | | ||
| | | |
ugross.dev
|
|
| | Linked list is a linear data structure, this means that there is a sequence and an order to how they are constructed and traversed. The... |