Post-quantum cryptography
Cryptography is essential for the security of online communication, cars and implanted
medical devices. However, many commonly used cryptosystems will be completely broken …
medical devices. However, many commonly used cryptosystems will be completely broken …
A survey on security challenges and solutions in the IOTA
Wide-scale adoption of the Internet of Everything requires decentralized security,
responsibility, and trust among the stakeholders. All these can be achieved by a Distributed …
responsibility, and trust among the stakeholders. All these can be achieved by a Distributed …
zkbridge: Trustless cross-chain bridges made practical
Blockchains have seen growing traction with cryptocurrencies reaching a market cap of over
1 trillion dollars, major institution investors taking interests, and global impacts on …
1 trillion dollars, major institution investors taking interests, and global impacts on …
Internet of Things: A survey on the security of IoT frameworks
Abstract The Internet of Things (IoT) is heavily affecting our daily lives in many domains,
ranging from tiny wearable devices to large industrial systems. Consequently, a wide variety …
ranging from tiny wearable devices to large industrial systems. Consequently, a wide variety …
Enhancing bitcoin security and performance with strong consistency via collective signing
While showing great promise, Bitcoin requires users to wait tens of minutes for transactions
to commit, and even then, offering only probabilistic guarantees. This paper introduces …
to commit, and even then, offering only probabilistic guarantees. This paper introduces …
Identity inference of genomic data using long-range familial searches
Consumer genomics databases have reached the scale of millions of individuals. Recently,
law enforcement authorities have exploited some of these databases to identify suspects via …
law enforcement authorities have exploited some of these databases to identify suspects via …
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
Side-channel risks of Intel SGX have recently attracted great attention. Under the spotlight is
the newly discovered page-fault attack, in which an OS-level adversary induces page faults …
the newly discovered page-fault attack, in which an OS-level adversary induces page faults …
Simple schnorr multi-signatures with applications to bitcoin
We describe a new Schnorr-based multi-signature scheme (ie, a protocol which allows a
group of signers to produce a short, joint signature on a common message) called MuSig …
group of signers to produce a short, joint signature on a common message) called MuSig …
Ring confidential transactions
S Noether, A Mackenzie - Ledger, 2016 - ledger.pitt.edu
This article introduces a method of hiding transaction amounts in the strongly decentralized
anonymous cryptocurrency Monero. Similar to Bitcoin, Monero is a cryptocurrency which is …
anonymous cryptocurrency Monero. Similar to Bitcoin, Monero is a cryptocurrency which is …
A formal security analysis of the signal messaging protocol
The Signal protocol is a cryptographic messaging protocol that provides end-to-end
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …