DIDisco - Tech - cryptography

⧉infominer 03-Jul-19 04:01 AM
BurnBox: Self-Revocable Encryption in a World Of Compelled Access https://eprint.iacr.org/2018/638.pdf https://arstechnica.com/information-technology/2013/10/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography/ A (relatively easy to understand) primer on elliptic curve cryptog... Everything you wanted to know about the next generation of public key crypto. https://fieldnotes.resistant.tech/ https://blockstream.com/2018/01/23/musig-key-aggregation-schnorr-signatures.html "MuSig, in the form that this article describes, is not secure" Key Aggregation for Schnorr Signatures Last Monday we published a paper that introduces MuSig, a multi-signature scheme based on Schnorr signatures. This post will dive into its construction and a... https://eprint.iacr.org/2018/417.pdf - re: above https://twitter.com/pwuille/status/998314349969031170 https://medium.com/zkcapital/the-state-of-hashing-algorithms-the-why-the-how-and-the-future-b21d5c0440de https://www.bouncycastle.org/about.html Lest We Remember: Cold Boot Attacks on Encryption Keys -https://jhalderm.com/pub/papers/coldboot-sec08.pdf New Directions in Cryptography -https://ee.stanford.edu/~hellman/publications/24.pdf Validation of Elliptic Curve Public Keys -https://iacr.org/archive/pkc2003/25670211/25670211.pdf -choosing safe curves for elliptic-curve cryptography https://safecurves.cr.yp.to/ https://twitter.com/newmichwill/status/1031577869548314624
Everything you wanted to know about the next generation of public key crypto.
Observations on Robust Decentralized Systems

Leave a comment

Your email address will not be published. Required fields are marked *