Hierarchical Deterministic Wallets (BIP032/BIP044) in MPCIn Bitcoin and other cryptocurrencies, the use of hierarchical deterministic wallets (HD wallets) is a widely accepted practice. Loosely…May 13, 2020May 13, 2020
The Zoom Encryption DebateCryptographic experts explain the encryption protocols Zoom uses for its record 220 million users, and what they mean for cybersecurity in…Apr 7, 2020Apr 7, 2020
What is Secure Multiparty Computation (MPC)?In this blog series, I will describe what secure multiparty computation is, what it can be used for, how it works (to some extent), and…Mar 24, 2020Mar 24, 2020
An MPC Protocol is Not a Security SolutionThis is the eighth and last blog in a series aimed at explaining the growing use of MPC and threshold signing to protect cryptocurrencies.Mar 9, 2020Mar 9, 2020
Publicly Verifiable Backup of Signing KeysThis is the seventh blog in a series aimed at explaining the growing use of MPC and threshold signing to protect cryptocurrencies.Jan 7, 2020Jan 7, 2020
RSA, Randomness and IoTA new paper by researchers at KeyFactor shows how an extremely high number of RSA keys on the Internet can be completely broken, in very…Dec 19, 2019Dec 19, 2019
Plundervolt — Yet Another Attack on SGX, with Roots in 20 Year-Old ResearchA new yet another attack on SGX, called Plundervolt, works by playing around with the clock speed and voltage to the chip in order to…Dec 12, 2019Dec 12, 2019
The Importance of Proofs of SecurityAs with any area of modern cryptography, any MPC protocol must be proven secure relative to a specific definition of security.Nov 28, 2019Nov 28, 2019
Asynchronous Approval in Threshold SigningThis is the fifth blog in a series aimed at explaining the growing use of MPC and threshold signing to protect cryptocurrencies.Oct 23, 2019Oct 23, 2019
MPC Compared to Other Approaches — MPC for Cryptocurrency ProtectionThis is the fourth blog in a series aimed at explaining the growing use of MPC and threshold signing to protect cryptocurrencies.Sep 3, 2019Sep 3, 2019