Explore >> Select a destination


You are here

martinralbrecht.wordpress.com
| | blog.trailofbits.com
5.5 parsecs away

Travel
| | By Joop van de Pol We found a vulnerability in a threshold signature scheme that allows an attacker to recover the signing key of threshold ECDSA implementations that are based on Oblivious Transfer (OT). A malicious participant of the threshold signing protocols could perform selective abort attacks during the OT extension subprotocol, recover the secret
| | malb.io
4.3 parsecs away

Travel
| |
| | lucatrevisan.wordpress.com
5.1 parsecs away

Travel
| | Today we will see how to use the analysis of the multiplicative weights algorithm in order to construct pseudorandom sets. The method will yield constructions that are optimal in terms of the size of the pseudorandom set, but not very efficient, although there is at least one case (getting an ``almost pairwise independent'' pseudorandom generator)...
| | rakhim.org
31.5 parsecs away

Travel
|