Prof. Yehuda LindellHierarchical Deterministic Wallets (BIP032/BIP044) in MPCIn Bitcoin and other cryptocurrencies, the use of hierarchical deterministic wallets (HD wallets) is a widely accepted practice. Loosely…May 13, 2020May 13, 2020
Prof. Yehuda LindellThe Zoom Encryption DebateCryptographic experts explain the encryption protocols Zoom uses for its record 220 million users, and what they mean for cybersecurity in…Apr 7, 2020Apr 7, 2020
Prof. Yehuda LindellWhat is Secure Multiparty Computation (MPC)?In this blog series, I will describe what secure multiparty computation is, what it can be used for, how it works (to some extent), and…Mar 24, 2020Mar 24, 2020
Prof. Yehuda LindellAn MPC Protocol is Not a Security SolutionThis is the eighth and last blog in a series aimed at explaining the growing use of MPC and threshold signing to protect cryptocurrencies.Mar 9, 2020Mar 9, 2020
Prof. Yehuda LindellPublicly Verifiable Backup of Signing KeysThis is the seventh blog in a series aimed at explaining the growing use of MPC and threshold signing to protect cryptocurrencies.Jan 7, 2020Jan 7, 2020
Prof. Yehuda LindellRSA, Randomness and IoTA new paper by researchers at KeyFactor shows how an extremely high number of RSA keys on the Internet can be completely broken, in very…Dec 19, 2019Dec 19, 2019
Prof. Yehuda LindellPlundervolt — Yet Another Attack on SGX, with Roots in 20 Year-Old ResearchA new yet another attack on SGX, called Plundervolt, works by playing around with the clock speed and voltage to the chip in order to…Dec 12, 2019Dec 12, 2019
Prof. Yehuda LindellThe Importance of Proofs of SecurityAs with any area of modern cryptography, any MPC protocol must be proven secure relative to a specific definition of security.Nov 28, 2019Nov 28, 2019
Prof. Yehuda LindellAsynchronous Approval in Threshold SigningThis is the fifth blog in a series aimed at explaining the growing use of MPC and threshold signing to protect cryptocurrencies.Oct 23, 2019Oct 23, 2019
Prof. Yehuda LindellMPC Compared to Other Approaches — MPC for Cryptocurrency ProtectionThis is the fourth blog in a series aimed at explaining the growing use of MPC and threshold signing to protect cryptocurrencies.Sep 3, 2019Sep 3, 2019