|
You are here |
eprint.iacr.org | ||
| | | | |
blog.trailofbits.com
|
|
| | | | | By Joop van de Pol We found a vulnerability in a threshold signature scheme that allows an attacker to recover the signing key of threshold ECDSA implementations that are based on Oblivious Transfer (OT). A malicious participant of the threshold signing protocols could perform selective abort attacks during the OT extension subprotocol, recover the secret | |
| | | | |
www.johndcook.com
|
|
| | | | | About how many items can you expect to hash with a secure hash function before risking into collisions? Here's a rule of thumb and a proof. | |
| | | | |
zenodo.org
|
|
| | | | | An elevation model of Bryce Canyon,USA Landform features: narrowrock formations known as hoodoos Resolution: 1 meter, 4,000 x 3,800 height samples File format: Esri ASCII This is one model of a set of elevation models:https://doi.org/10.5281/zenodo.3938020. Please cite the entire set of models. When using thiselevation modelin an academic publication, please cite the following article, which describes the process and rationale for compiling elevation models: Kennelly, P. J., Patterson, T., Jenny, B... | |
| | | | |
daily-philosophy.com
|
|
| | | John Horton Conway (1937-2020), mathematician, inventor of the Game of Life simulation of cellular automata. | ||