|
You are here |
eprint.iacr.org | ||
| | | | |
blog.trailofbits.com
|
|
| | | | | By Joop van de Pol We found a vulnerability in a threshold signature scheme that allows an attacker to recover the signing key of threshold ECDSA implementations that are based on Oblivious Transfer (OT). A malicious participant of the threshold signing protocols could perform selective abort attacks during the OT extension subprotocol, recover the secret | |
| | | | |
www.da.vidbuchanan.co.uk
|
|
| | | | | ||
| | | | |
www.johndcook.com
|
|
| | | | | About how many items can you expect to hash with a secure hash function before risking into collisions? Here's a rule of thumb and a proof. | |
| | | | |
quantumcomputinginc.com
|
|
| | | |||