cryptography

⧉infominer 07-Aug-18 11:48 PM
BurnBox: Self-Revocable Encryption in a World Of Compelled Access https://eprint.iacr.org/2018/638.pdf (edited)
⧉infominer 08-Aug-18 12:40 AM
Observations on Robust Decentralized Systems
⧉infominer 09-Aug-18 04:28 AM
https://blockstream.com/2018/01/23/musig-key-aggregation-schnorr-signatures.html "MuSig, in the form that this article describes, is not secure" (edited)
Last Monday we published a paper that introduces MuSig, a multi-signature scheme based on Schnorr signatures. This post will dive into its construction and a...
⧉infominer 09-Aug-18 08:52 AM
⧉infominer 09-Aug-18 10:11 AM
We've updated our MuSig paper at https://t.co/ikQTBp12fl to use a 3-round signing protocol. A flaw in the proof for 2-round was found by https://t.co/2xTEfKWpYR. Note that no attack against 2-round is known and it might be secure, but is not provable under standard assumpt...
Likes
209
⧉infominer 10-Aug-18 11:00 PM
One of the keywords newcomers hear when learning about blockchain are the notions of a hash and a hashing algorithm which seem to be…
⧉infominer 11-Aug-18 09:03 PM
Home of open source libraries of the Legion of the Bouncy Castle and their Java cryptography and C# cryptography resources
⧉infominer 13-Aug-18 03:24 PM
Lest We Remember: Cold Boot Attacks on Encryption Keys -https://jhalderm.com/pub/papers/coldboot-sec08.pdf (edited)
New Directions in Cryptography -https://ee.stanford.edu/~hellman/publications/24.pdf (edited)
⧉infominer 13-Aug-18 03:58 PM
Validation of Elliptic Curve Public Keys -https://iacr.org/archive/pkc2003/25670211/25670211.pdf
⧉infominer 21-Aug-18 07:04 PM
-choosing safe curves for elliptic-curve cryptography https://safecurves.cr.yp.to/ (edited)
⧉infominer 22-Aug-18 11:49 PM
We @nucypher have discovered that Fully Homomorphic Encryption actually can be 100 times faster than one previously thought: thanks https://t.co/RwxlrHryhc for doing the GPU magic! #FHE #encryption #Python https://t.co/kZDhDIkaZF
Likes
182
⧉infominer 25-Aug-18 08:39 PM
What are they, how do they work, and are they fast yet?
⧉infominer 25-Aug-18 09:35 PM
This should be a very interesting read, and right out of the cypherpunk playbook: BurnBox: Self-Revocable Encryption in a World Of Compelled Access, by Nirvan Tyagi and Muhammad Haris Mughees and Thomas Ristenpart and Ian Miers https://t.co/umsGOOQ48b
⧉infominer 25-Aug-18 10:04 PM
"Bitcoin, and cryptography in general, are defensive technologies that make the cost of defending property & information far lower than the cost of attacking them." - @saifedean The ramifications of changing the economics of violence cannot be overstated.
Retweets
404
Likes
1134
⧉infominer 25-Aug-18 10:18 PM
Video from @pwuille's talk on Taproot, Schnorr and SIGHASH_NOINPUT is now available https://t.co/db1wUfhtcm
Retweets
144
Likes
368
⧉infominer 25-Aug-18 10:52 PM
Some thoughts about a set of p2p protocols that don't require group consensus, & can be augmented through trust. That I'm pretty sure might be useful in metadata resistant systems, & I would like to find more evidence of. (i.e. please point me at papers) https://t.co/ro4...
⧉infominer 26-Aug-18 12:00 AM
If you are waiting for a government to give you meaningful privacy from surveillance you are going to be waiting a long time. Privacy is consent. Consent is, unfortunately, something that you sometimes have to enforce.
Likes
121
As of the end of July 2018, the Let’s Encrypt root, ISRG Root X1, is directly trusted by Microsoft products. Our root is now trusted by all major root programs, including Microsoft, Google, Apple, Mozilla, Oracle, and Blackberry. Today’s announcement that we’re trusted ...
⧉infominer 27-Aug-18 07:29 AM
Those of us who follow these things for various reasons, P 1323565.1.020-2018 is the recommendation on the use of Russian national cryptography with TLS 1.2. https://t.co/KVXXvKdvmF
⧉infominer 27-Aug-18 02:35 PM
In a recently published FAQ, the NSA outlines the switch for NSS (National Security Systems) from Su...
⧉infominer 30-Aug-18 07:34 PM
The best known cryptographic problem is that of privacy; preventing the unauthorised extraction of information from communications over insecure channels” [DH76]
⧉infominer 04-Sep-18 11:58 AM
Tink is a multi-language, cross-platform library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse. - google/tink
⧉infominer 07-Sep-18 02:38 AM
In this episode, we speak to Benedikt Bünz, the author of Bulletproofs, about this zero knowledge proof system as well as about Verifiable Delay Functions.
vincent 15-Sep-18 05:48 AM
Bulletproofs The recent publication of this paper by Benedikt Bünz of Stanford (and coauthors) has caused quite a stir amongst Bitcoin people. It's kind of obscure for a non- or semi- technical audience, but most people who heard about it got the gist: this may be the way to...
⧉infominer 17-Sep-18 12:18 AM
The Science of Secrecy from Ancient Egypt to Quantum Cryptography -Simon Singh](https://www.math.uci.edu/~brusso/freshman6.pdf) (edited)
⧉infominer 01-Oct-18 12:55 PM
What is the story behind MimbleWimble? What is Grin? What is a Dandelion transaction relay, as described in BIP156, and how does it improve the anonymity of ...
⧉infominer 03-Oct-18 03:08 AM
Josh Zepps, Simon Singh, Orr Dunkelman, Tal Rabin, and Brian Snow discuss how, since the earliest days of communication, clever minds have devised methods fo...
⧉infominer 04-Oct-18 04:15 AM
⧉infominer 07-Oct-18 04:55 AM
Elliptic curves are a mathematical concept that is fundamental to the operation of cryptocurrencies like Bitcoin taking the form y^2 = x^3 +ax +b. With them it is possible to create public and priv…
Merkle Trees are data structures  used by blockchain technologies. They store hashes of data. It is particularly useful for decentralized network applications as a way to verify data is correct acr…
⧉infominer 12-Oct-18 03:52 PM
A curated list of cryptography resources and links. - sobolevn/awesome-cryptography
⧉infominer 13-Oct-18 03:09 PM
Finding randomness on the blockchain is hard. A classic mistake developers make when trying to acquire a random value on-chain is to use quantities like future block hashes, block difficulty, or ti…
⧉infominer 25-Nov-18 08:56 PM
Mathematics of Public Key Cryptography” https://t.co/yFCpbs25Eo
⧉infominer 05-Dec-18 06:48 AM
In the previous post I wrote about Schnorr signatures and how awesome they are. This one is about Boneh-Lynn-Shacham signatures and their…
⧉infominer 17-Dec-18 05:50 PM
⧉infominer 22-Dec-18 04:46 PM
It's a common complaint that cryptography is too hard for regular people to understand - and that all our current cryptographically secure applications are designed for cyborgs and not humans. While...
In "cinderella" a young woman living in unfortunate circumstances who's situation suddenly changes, when a magical entity appears and gives her a make-over, allowing her to attend a fancy ball at...
⧉infominer 25-Dec-18 03:45 PM
The Art of Computer Programming, Volume 3 sorting and searching (73?) (edited)
Foundations of Secure Computation '78
Today's hashes have many uses. File integrity, verification of a secret without revealing the secret (i.e. passwords), hash maps, bloom filters, and probably a few more cases not immediately coming...
⧉infominer 27-Dec-18 03:22 PM
One of the best things about modern cryptography is the beautiful terminology. You could start any number of punk bands (or Tumblrs) named after cryptography terms like ‘hard-core predicate&#…
⧉infominer 30-Dec-18 08:00 PM
vincent 11-Jan-19 09:10 AM
Contribute to starzyp/vcs development by creating an account on GitHub.
⧉infominer 21-Jan-19 09:48 PM
I have read in several papers that the existence of one-way functions is widely believed. Can someone shed light on why this is the case? What arguments do we have for supporting the existence of o...
⧉infominer 13-Feb-19 08:29 PM
A great way to learn a new skill is to build something with it. This is particularly true in the cryptocurrency and blockchain space…
⧉infominer 13-Feb-19 08:54 PM
What are zk-SNARKs? Pairings (Part 1) by @joshbfitzgerald https://t.co/2s6acuMoVV
⧉infominer 11-Mar-19 10:45 PM
I'm happy to announce Sonic, a new zero-knowledge SNARK developed in collaboration with Mary Maller, Markulf Kohlweiss and Sarah Meiklejohn. https://t.co/z73tZ6db5j
Retweets
157
Likes
427
⧉infominer 22-Mar-19 10:44 PM
A curated list of cryptography resources and links. - sobolevn/awesome-cryptography
⧉infominer 30-Mar-19 06:15 AM
While Git supports PGP signing for tags and commits natively, like other usesof PGP a major caveat exists: How do you verify a signature from a revoked orexp...
⧉infominer 05-May-19 08:40 AM
How do I know so many made-up stories about how the Enigma code was cracked and didn't know until yesterday how interesting the real story is? A volunteer at the National Museum of Computing at Bletchley Park just casually blew my mind with a bit of the story. /1
Retweets
5502
Likes
10883
⧉infominer 12-May-19 08:30 PM
Hate GPG? Wish there were a replacement? I've been talk to a few people about this including @FiloSottile and @justincormack, and after much ado written up a design for a next-generation encrypted file archive format: https://t.co/Db9N9Cyqxk
Likes
221
⧉infominer 13-May-19 02:41 PM
⧉infominer 25-May-19 01:39 AM
⧉infominer 08-Jul-19 11:07 AM
Here at Trail of Bits we review a lot of code. From major open source projects to exciting new proprietary software, we’ve seen it all. But one common denominator in all of these systems is that fo…
⧉infominer 08-Aug-19 10:46 PM
An Overview of Cryptography Gary C. Kessler 21 July 2019 © 1998-2019 — A much shorter version of this paper first appeared in Handbook on Local Area Networks (Auerbach, Sept. 1998). Since that time, this paper has taken on a life of its own... https://t.co/wZl2m...