Lotta overlap between here and #security channel
⧉infominer 07-Aug-18 11:48 PM
BurnBox: Self-Revocable Encryption in a World Of Compelled Access https://eprint.iacr.org/2018/638.pdf (edited)
⧉infominer 08-Aug-18 12:04 AM
⧉infominer 09-Aug-18 04:28 AM
https://blockstream.com/2018/01/23/musig-key-aggregation-schnorr-signatures.html "MuSig, in the form that this article describes, is not secure" (edited)
⧉infominer 09-Aug-18 08:52 AM
https://eprint.iacr.org/2018/417.pdf - re: above
⧉infominer 09-Aug-18 10:11 AMTwitter
We've updated our MuSig paper at https://t.co/ikQTBp12fl to use a 3-round signing protocol. A flaw in the proof for 2-round was found by https://t.co/2xTEfKWpYR. Note that no attack against 2-round is known and it might be secure, but is not provable under standard assumpt...
⧉infominer 10-Aug-18 11:00 PM
One of the keywords newcomers hear when learning about blockchain are the notions of a hash and a hashing algorithm which seem to be…
⧉infominer 13-Aug-18 03:24 PM
Lest We Remember: Cold Boot Attacks on Encryption Keys -https://jhalderm.com/pub/papers/coldboot-sec08.pdf (edited)
New Directions in Cryptography -https://ee.stanford.edu/~hellman/publications/24.pdf (edited)
⧉infominer 13-Aug-18 03:58 PM
Validation of Elliptic Curve Public Keys -https://iacr.org/archive/pkc2003/25670211/25670211.pdf
⧉infominer 21-Aug-18 07:04 PM
-choosing safe curves for elliptic-curve cryptography https://safecurves.cr.yp.to/ (edited)
⧉infominer 22-Aug-18 11:49 PM
⧉infominer 25-Aug-18 09:35 PM
⧉infominer 25-Aug-18 10:04 PMTwitter
"Bitcoin, and cryptography in general, are defensive technologies that make the cost of defending property & information far lower than the cost of attacking them." - @saifedean The ramifications of changing the economics of violence cannot be overstated.
⧉infominer 25-Aug-18 10:18 PM
⧉infominer 25-Aug-18 10:39 PM
⧉infominer 25-Aug-18 10:52 PMTwitter
Some thoughts about a set of p2p protocols that don't require group consensus, & can be augmented through trust. That I'm pretty sure might be useful in metadata resistant systems, & I would like to find more evidence of. (i.e. please point me at papers) https://t.co/ro4...
⧉infominer 26-Aug-18 12:00 AMTwitter
If you are waiting for a government to give you meaningful privacy from surveillance you are going to be waiting a long time. Privacy is consent. Consent is, unfortunately, something that you sometimes have to enforce.
As of the end of July 2018, the Let’s Encrypt root, ISRG Root X1, is directly trusted by Microsoft products. Our root is now trusted by all major root programs, including Microsoft, Google, Apple, Mozilla, Oracle, and Blackberry. Today’s announcement that we’re trusted ...
⧉infominer 27-Aug-18 07:29 AM
⧉infominer 27-Aug-18 02:35 PM
⧉infominer 30-Aug-18 07:34 PMTwitter
The best known cryptographic problem is that of privacy; preventing the unauthorised extraction of information from communications over insecure channels” [DH76]
⧉infominer 07-Sep-18 02:38 AM
SNARKS -https://eprint.iacr.org/2013/879.pdf STARKS -https://eprint.iacr.org/2018/046 http://www.zeroknowledge.fm/40
In this episode, we speak to Benedikt Bünz, the author of Bulletproofs, about this zero knowledge proof system as well as about Verifiable Delay Functions.
vincent 15-Sep-18 05:48 AM
Bulletproofs The recent publication of this paper by Benedikt Bünz of Stanford (and coauthors) has caused quite a stir amongst Bitcoin people. It's kind of obscure for a non- or semi- technical audience, but most people who heard about it got the gist: this may be the way to...
⧉infominer 17-Sep-18 12:18 AM
The Science of Secrecy from Ancient Egypt to Quantum Cryptography -Simon Singh](https://www.math.uci.edu/~brusso/freshman6.pdf) (edited)
⧉infominer 03-Oct-18 03:08 AM
Josh Zepps, Simon Singh, Orr Dunkelman, Tal Rabin, and Brian Snow discuss how, since the earliest days of communication, clever minds have devised methods fo...
⧉infominer 04-Oct-18 04:15 AM
introduction to bulletproofs http://diyhpl.us/wiki/transcripts/scalingbitcoin/tokyo-2018/edgedevplusplus/bulletproofs/
⧉infominer 07-Oct-18 04:55 AM
Elliptic curves are a mathematical concept that is fundamental to the operation of cryptocurrencies like Bitcoin taking the form y^2 = x^3 +ax +b. With them it is possible to create public and priv…
⧉infominer 13-Oct-18 03:09 PM
⧉infominer 25-Nov-18 08:56 PM
⧉infominer 05-Dec-18 06:48 AM
In the previous post I wrote about Schnorr signatures and how awesome they are. This one is about Boneh-Lynn-Shacham signatures and their…
⧉infominer 17-Dec-18 05:50 PM
⧉infominer 22-Dec-18 04:46 PM
⧉infominer 25-Dec-18 03:45 PM
The Art of Computer Programming, Volume 3 sorting and searching (73?) (edited)
Foundations of Secure Computation '78
Today's hashes have many uses. File integrity, verification of a secret without revealing the secret (i.e. passwords), hash maps, bloom filters, and probably a few more cases not immediately coming...
⧉infominer 27-Dec-18 03:22 PM
⧉infominer 30-Dec-18 08:00 PM
⧉infominer 30-Dec-18 09:10 PM
vincent 11-Jan-19 09:10 AM
⧉infominer 21-Jan-19 09:48 PM
I have read in several papers that the existence of one-way functions is widely believed. Can someone shed light on why this is the case? What arguments do we have for supporting the existence of o...
⧉infominer 13-Feb-19 08:29 PM
A great way to learn a new skill is to build something with it. This is particularly true in the cryptocurrency and blockchain space…
⧉infominer 13-Feb-19 08:54 PM
⧉infominer 15-Feb-19 12:16 PM
⧉infominer 11-Mar-19 10:45 PM
⧉infominer 30-Mar-19 06:15 AM
While Git supports PGP signing for tags and commits natively, like other usesof PGP a major caveat exists: How do you verify a signature from a revoked orexp...