A survey of distributed consensus protocols for blockchain networks
Since the inception of Bitcoin, cryptocurrencies and the underlying blockchain technology
have attracted an increasing interest from both academia and industry. Among various core …
have attracted an increasing interest from both academia and industry. Among various core …
An all-inclusive taxonomy and critical review of blockchain-assisted authentication and session key generation protocols for IoT
Authentication and Session Key Generation Protocols (SKGPs) play an essential role in
securing the communication channels of connected Internet of Things (IoT) devices …
securing the communication channels of connected Internet of Things (IoT) devices …
Internet of drones security and privacy issues: Taxonomy and open challenges
Internet of Drones (IoD) is a decentralized network and management framework that links
drones' access to the controlled airspace and provides inter-location navigation services …
drones' access to the controlled airspace and provides inter-location navigation services …
A pragmatic introduction to secure multi-party computation
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …
to a tool for building real systems today. Over the past decade, MPC has been one of the …
[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …
publickey cryptographic algorithms through a public, competition-like process. The new …
On security analysis of proof-of-elapsed-time (poet)
As more applications are built on top of blockchain and public ledger, different approaches
are developed to improve the performance of blockchain construction. Recently Intel …
are developed to improve the performance of blockchain construction. Recently Intel …
Instahide: Instance-hiding schemes for private distributed learning
How can multiple distributed entities train a shared deep net on their private data while
protecting data privacy? This paper introduces InstaHide, a simple encryption of training …
protecting data privacy? This paper introduces InstaHide, a simple encryption of training …
A decade of lattice cryptography
Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …
A formal security analysis of the signal messaging protocol
The Signal protocol is a cryptographic messaging protocol that provides end-to-end
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …
Fractal: Post-quantum and Transparent Recursive Proofs from Holography
We present a new methodology to efficiently realize recursive composition of succinct non-
interactive arguments of knowledge (SNARKs). Prior to this work, the only known …
interactive arguments of knowledge (SNARKs). Prior to this work, the only known …