|
You are here |
martinralbrecht.wordpress.com | ||
| | | | |
blog.trailofbits.com
|
|
| | | | | By Joop van de Pol We found a vulnerability in a threshold signature scheme that allows an attacker to recover the signing key of threshold ECDSA implementations that are based on Oblivious Transfer (OT). A malicious participant of the threshold signing protocols could perform selective abort attacks during the OT extension subprotocol, recover the secret | |
| | | | |
malb.io
|
|
| | | | | ||
| | | | |
lucatrevisan.wordpress.com
|
|
| | | | | Today we will see how to use the analysis of the multiplicative weights algorithm in order to construct pseudorandom sets. The method will yield constructions that are optimal in terms of the size of the pseudorandom set, but not very efficient, although there is at least one case (getting an ``almost pairwise independent'' pseudorandom generator)... | |
| | | | |
rakhim.org
|
|
| | | |||