Explore >> Select a destination


You are here

eprint.iacr.org
| | blog.trailofbits.com
46.6 parsecs away

Travel
| | By Joop van de Pol We found a vulnerability in a threshold signature scheme that allows an attacker to recover the signing key of threshold ECDSA implementations that are based on Oblivious Transfer (OT). A malicious participant of the threshold signing protocols could perform selective abort attacks during the OT extension subprotocol, recover the secret
| | www.da.vidbuchanan.co.uk
4.1 parsecs away

Travel
| |
| | www.johndcook.com
13.3 parsecs away

Travel
| | About how many items can you expect to hash with a secure hash function before risking into collisions? Here's a rule of thumb and a proof.
| | quantumcomputinginc.com
79.8 parsecs away

Travel
|