Open in app

Sign In

Write

Sign In

Silence Laboratories
Silence Laboratories

18 Followers

Home

About

Jay Prakash

Jay Prakash

·Pinned

The Third Dimension of User-Centric Studies for Decentralised Systems

Usability, Security, and Empowerment Jay and the team at Silence Laboratories Welcome to the series towards studying and analysing designs that enable decentralisation, through a user-centric lens, with a focus on those catering to the proliferation of security in digital assets. Above all, infrastructure to enable decentralization inherently aims to empower users. A Digital…

Wallet

5 min read

The Third Dimension of User-Centric Studies for Decentralised Systems
The Third Dimension of User-Centric Studies for Decentralised Systems
Wallet

5 min read


Derya Karl

Derya Karl

·Pinned

How is ETH 2.0 going to enhance the security landscape?

Some recent musings Silence Laboratories Scalability for Ethereum, at present, faces the problem of every node verifying and executing every transaction, which is an expensive process. To achieve decentralization, blockchains must scale horizontally. …

Ethereum

10 min read

How is ETH 2.0 going to enhance the security landscape?
How is ETH 2.0 going to enhance the security landscape?
Ethereum

10 min read


Silence Laboratories

Silence Laboratories

·Pinned

How Silent Shard is Transforming Authentication Support for Crypto Wallets and Exchanges?

Author: Silence Laboratories (Contributor: Himanshu Soni) At SL, We are removing all excuses by enterprises and communities for not adopting secure ways of signatures and authentication through a unique fusion of multi-party computation (MPC) based cryptography and signal processing based layer of proofs. What is Silent Shard? Silent Shard aims to be the de-facto…

Crytpo

10 min read

How Silent Shard is Transforming Authentication Support for Crypto Wallets and Exchanges?
How Silent Shard is Transforming Authentication Support for Crypto Wallets and Exchanges?
Crytpo

10 min read


James Wild

James Wild

·Jun 6

Offline Proactive Refresh: Strengthening Threshold Signature Wallets

By James Wild and the team at Silence Laboratories Managing digital assets and data safely, has emerged as a critical issue for both businesses and individuals. …

Mpc

6 min read

Offline Proactive Refresh: Strengthening Threshold Signature Wallets
Offline Proactive Refresh: Strengthening Threshold Signature Wallets
Mpc

6 min read


Jay Prakash

Jay Prakash

·May 15

Redefining the Nomenclature of Web3 Custody

Jay and the team at Silence Laboratories Self-Custody, Custodial, Non-Custodial, and similar such jargon are loosely used across the industry by products and protocols, creating confusion and a cascaded loss of trust. Let’s fix this once and for all. While nomenclature helps consolidate discussions, it also opens up doors for…

Mpc

9 min read

Redefining the Nomenclature of Web3 Custody
Redefining the Nomenclature of Web3 Custody
Mpc

9 min read


Jay Prakash

Jay Prakash

·Feb 7

A Compute Perspective of MPC-TSS: Paillier in ECDSA Revisited

Yashvanth, Jay, and members at Silence Laboratories Multi-Party Computation (MPC) as a technology has seen promising growth and wider adoption, in large part due to interest fueled by recent attacks exploiting single points of failure in managing private keys. …

Multi Party Computation

8 min read

A Compute Perspective of MPC-TSS: Paillier in ECDSA Revisited
A Compute Perspective of MPC-TSS: Paillier in ECDSA Revisited
Multi Party Computation

8 min read


Lucy

Lucy

·Feb 2

A Discussion On Collusion-Resistant Protocols In Secret Sharing

One of the biggest problems faced by organizations in the cryptography era is securing sensitive data like private keys used for encryption and authentication. An individual’s private key is the gateway to their financial assets, so losing it or getting it stolen can be catastrophic. The current solutions control the…

Multi Party Computation

12 min read

A Discussion On Collusion-Resistant Protocols In Secret Sharing
A Discussion On Collusion-Resistant Protocols In Secret Sharing
Multi Party Computation

12 min read


Derya Karl

Derya Karl

·Sep 2, 2022

Why is the Threshold Signature Scheme better than Multi-Sig and Shamir’s Secret?

Musings by Silence Laboratories Team A challenge in the usage of digital signatures is the management of private keys whose leakage to malicious parties could harm the validity of the current platforms. Therefore, the storage and management of the key should be maintained carefully. Delegating the key management to a…

Cybersecurity

5 min read

Cybersecurity

5 min read


Silence Laboratories

Silence Laboratories

·Jun 19, 2022

SilentRide: Effortless Authentication Library for Mobility

By: Abhinav Gupta @Silence Laboratories Silent Rider is a library to enable effortless authentication for mobility being used for fast check-ins (<1 second) while boarding a bus, car, or bike without needing to scan a code or seek an OTP. Just passing by the gate will get you verified. The…

Cybersecurity

5 min read

SilentRide: Effortless Authentication Library for Mobility
SilentRide: Effortless Authentication Library for Mobility
Cybersecurity

5 min read


Mansi Pradhan

Mansi Pradhan

·Feb 17, 2022

How can MFA solve the burning issue of Cyber Security in Healthcare?

By Mansi Pradhan, Jay & Team Silence Laboratories According to the Ponemon Institute and Verizon Data Breach Investigations Report[1], the health industry experiences more data breaches than any other sector. Healthcare data breaches are the costliest, with an average cost of $9.23 …

Cybersecurity

4 min read

How can MFA solve the burning issue of Cyber Security in Healthcare?
How can MFA solve the burning issue of Cyber Security in Healthcare?
Cybersecurity

4 min read

Silence Laboratories

We are redefining authentication by providing a quantum leap in seamlessness and security.

Editors

Silence Laboratories

Silence Laboratories

The only Cybersecurity library you need for seamless and decentralized authentication

Die Schwarze Katze

Die Schwarze Katze

A pseudonymous lil Black Kat who exists on the multi-chain astral level with a penchant for Multi Party Computation, Crypto Legal and Decentralized Science.

Kush Kanwar

Kush Kanwar

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams