⧉infominer 07-Aug-18 11:48 PM
BurnBox: Self-Revocable Encryption in a World Of Compelled Access (edited)
⧉infominer 08-Aug-18 12:40 AM
Observations on Robust Decentralized Systems
⧉infominer 09-Aug-18 04:28 AM "MuSig, in the form that this article describes, is not secure" (edited)
Last Monday we published a paper that introduces MuSig, a multi-signature scheme based on Schnorr signatures. This post will dive into its construction and a...
⧉infominer 09-Aug-18 08:52 AM
⧉infominer 09-Aug-18 10:11 AM
We've updated our MuSig paper at to use a 3-round signing protocol. A flaw in the proof for 2-round was found by Note that no attack against 2-round is known and it might be secure, but is not provable under standard assumpt...
⧉infominer 10-Aug-18 11:00 PM
One of the keywords newcomers hear when learning about blockchain are the notions of a hash and a hashing algorithm which seem to be…
⧉infominer 11-Aug-18 09:03 PM
Home of open source libraries of the Legion of the Bouncy Castle and their Java cryptography and C# cryptography resources
⧉infominer 13-Aug-18 03:24 PM
Lest We Remember: Cold Boot Attacks on Encryption Keys - (edited)
New Directions in Cryptography - (edited)
⧉infominer 13-Aug-18 03:58 PM
Validation of Elliptic Curve Public Keys -
⧉infominer 21-Aug-18 07:04 PM
-choosing safe curves for elliptic-curve cryptography (edited)
⧉infominer 22-Aug-18 11:49 PM
We @nucypher have discovered that Fully Homomorphic Encryption actually can be 100 times faster than one previously thought: thanks for doing the GPU magic! #FHE #encryption #Python
⧉infominer 25-Aug-18 08:39 PM
What are they, how do they work, and are they fast yet?
⧉infominer 25-Aug-18 09:35 PM
This should be a very interesting read, and right out of the cypherpunk playbook: BurnBox: Self-Revocable Encryption in a World Of Compelled Access, by Nirvan Tyagi and Muhammad Haris Mughees and Thomas Ristenpart and Ian Miers
⧉infominer 25-Aug-18 10:04 PM
"Bitcoin, and cryptography in general, are defensive technologies that make the cost of defending property & information far lower than the cost of attacking them." - @saifedean The ramifications of changing the economics of violence cannot be overstated.
⧉infominer 25-Aug-18 10:18 PM
Video from @pwuille's talk on Taproot, Schnorr and SIGHASH_NOINPUT is now available
⧉infominer 25-Aug-18 10:52 PM
Some thoughts about a set of p2p protocols that don't require group consensus, & can be augmented through trust. That I'm pretty sure might be useful in metadata resistant systems, & I would like to find more evidence of. (i.e. please point me at papers)
⧉infominer 26-Aug-18 12:00 AM
If you are waiting for a government to give you meaningful privacy from surveillance you are going to be waiting a long time. Privacy is consent. Consent is, unfortunately, something that you sometimes have to enforce.
As of the end of July 2018, the Let’s Encrypt root, ISRG Root X1, is directly trusted by Microsoft products. Our root is now trusted by all major root programs, including Microsoft, Google, Apple, Mozilla, Oracle, and Blackberry. Today’s announcement that we’re trusted ...
⧉infominer 27-Aug-18 07:29 AM
Those of us who follow these things for various reasons, P 1323565.1.020-2018 is the recommendation on the use of Russian national cryptography with TLS 1.2.
⧉infominer 27-Aug-18 02:35 PM
In a recently published FAQ, the NSA outlines the switch for NSS (National Security Systems) from Su...
⧉infominer 30-Aug-18 07:34 PM
The best known cryptographic problem is that of privacy; preventing the unauthorised extraction of information from communications over insecure channels” [DH76]
⧉infominer 04-Sep-18 11:58 AM
Tink is a multi-language, cross-platform library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse. - google/tink
⧉infominer 07-Sep-18 02:38 AM
In this episode, we speak to Benedikt Bünz, the author of Bulletproofs, about this zero knowledge proof system as well as about Verifiable Delay Functions.
vincent 15-Sep-18 05:48 AM
Bulletproofs The recent publication of this paper by Benedikt Bünz of Stanford (and coauthors) has caused quite a stir amongst Bitcoin people. It's kind of obscure for a non- or semi- technical audience, but most people who heard about it got the gist: this may be the way to...
⧉infominer 17-Sep-18 12:18 AM
The Science of Secrecy from Ancient Egypt to Quantum Cryptography -Simon Singh]( (edited)
⧉infominer 01-Oct-18 12:55 PM
What is the story behind MimbleWimble? What is Grin? What is a Dandelion transaction relay, as described in BIP156, and how does it improve the anonymity of ...
⧉infominer 03-Oct-18 03:08 AM
Josh Zepps, Simon Singh, Orr Dunkelman, Tal Rabin, and Brian Snow discuss how, since the earliest days of communication, clever minds have devised methods fo...
⧉infominer 04-Oct-18 04:15 AM
⧉infominer 07-Oct-18 04:55 AM
Elliptic curves are a mathematical concept that is fundamental to the operation of cryptocurrencies like Bitcoin taking the form y^2 = x^3 +ax +b. With them it is possible to create public and priv…
Merkle Trees are data structures  used by blockchain technologies. They store hashes of data. It is particularly useful for decentralized network applications as a way to verify data is correct acr…
⧉infominer 12-Oct-18 03:52 PM
A curated list of cryptography resources and links. - sobolevn/awesome-cryptography
⧉infominer 13-Oct-18 03:09 PM
Finding randomness on the blockchain is hard. A classic mistake developers make when trying to acquire a random value on-chain is to use quantities like future block hashes, block difficulty, or ti…
⧉infominer 25-Nov-18 08:56 PM
Mathematics of Public Key Cryptography”
⧉infominer 05-Dec-18 06:48 AM
In the previous post I wrote about Schnorr signatures and how awesome they are. This one is about Boneh-Lynn-Shacham signatures and their…
⧉infominer 17-Dec-18 05:50 PM
⧉infominer 22-Dec-18 04:46 PM
It's a common complaint that cryptography is too hard for regular people to understand - and that all our current cryptographically secure applications are designed for cyborgs and not humans. While...
In "cinderella" a young woman living in unfortunate circumstances who's situation suddenly changes, when a magical entity appears and gives her a make-over, allowing her to attend a fancy ball at...
⧉infominer 25-Dec-18 03:45 PM
The Art of Computer Programming, Volume 3 sorting and searching (73?) (edited)
Foundations of Secure Computation '78
Today's hashes have many uses. File integrity, verification of a secret without revealing the secret (i.e. passwords), hash maps, bloom filters, and probably a few more cases not immediately coming...
⧉infominer 27-Dec-18 03:22 PM
One of the best things about modern cryptography is the beautiful terminology. You could start any number of punk bands (or Tumblrs) named after cryptography terms like ‘hard-core predicate&#…
⧉infominer 30-Dec-18 08:00 PM
vincent 11-Jan-19 09:10 AM
Contribute to starzyp/vcs development by creating an account on GitHub.
⧉infominer 21-Jan-19 09:48 PM
I have read in several papers that the existence of one-way functions is widely believed. Can someone shed light on why this is the case? What arguments do we have for supporting the existence of o...
⧉infominer 13-Feb-19 08:29 PM
A great way to learn a new skill is to build something with it. This is particularly true in the cryptocurrency and blockchain space…
⧉infominer 13-Feb-19 08:54 PM
What are zk-SNARKs? Pairings (Part 1) by @joshbfitzgerald
⧉infominer 11-Mar-19 10:45 PM
I'm happy to announce Sonic, a new zero-knowledge SNARK developed in collaboration with Mary Maller, Markulf Kohlweiss and Sarah Meiklejohn.
⧉infominer 22-Mar-19 10:44 PM
A curated list of cryptography resources and links. - sobolevn/awesome-cryptography
⧉infominer 30-Mar-19 06:15 AM
While Git supports PGP signing for tags and commits natively, like other usesof PGP a major caveat exists: How do you verify a signature from a revoked orexp...