Kyodo TechThreshold Encryption for Secure Multi-Party CollaborationIn many cryptographic scenarios, there is a need to securely distribute a secret (e.g., an encryption key) among multiple participants such…Aug 1
Niek J. BoumanC++ build systems: our transition from CMake to MesonWe develop our main product, Cranmera MPC engine, in C++20. Since C++ doesn’t come with a default build system like Rust’s Cargo, it means…Feb 22, 20211
David MustacWill Arcium’s Confidential Computing Be the Groundbreaking Solution for Blockchain Privacy?The protection of sensitive information is more critical than ever. Traditional security measures primarily focus on safeguarding data at…Jun 25Jun 25
Rachata TosirisukinFinemaOverview, Applications, and Use Cases of Multi-Party Computation (MPC) for Key ManagementMulti-Party Computation (MPC) has recently emerged as one of the most promising techniques for protecting secrets such as cryptographic…Oct 15, 2022Oct 15, 2022
ARPA OfficialThe Art of Flexibility: Unpacking the Power of Programmable CryptographyCryptography has long been the preserve of mathematicians and computer scientists. However, recent advancements, particularly in…May 28May 28
Kyodo TechThreshold Encryption for Secure Multi-Party CollaborationIn many cryptographic scenarios, there is a need to securely distribute a secret (e.g., an encryption key) among multiple participants such…Aug 1
Niek J. BoumanC++ build systems: our transition from CMake to MesonWe develop our main product, Cranmera MPC engine, in C++20. Since C++ doesn’t come with a default build system like Rust’s Cargo, it means…Feb 22, 20211
David MustacWill Arcium’s Confidential Computing Be the Groundbreaking Solution for Blockchain Privacy?The protection of sensitive information is more critical than ever. Traditional security measures primarily focus on safeguarding data at…Jun 25
Rachata TosirisukinFinemaOverview, Applications, and Use Cases of Multi-Party Computation (MPC) for Key ManagementMulti-Party Computation (MPC) has recently emerged as one of the most promising techniques for protecting secrets such as cryptographic…Oct 15, 2022
ARPA OfficialThe Art of Flexibility: Unpacking the Power of Programmable CryptographyCryptography has long been the preserve of mathematicians and computer scientists. However, recent advancements, particularly in…May 28
DuoKeyHow Multi-Party Computation (MPC) Works and Why It Matters for CISOsDiscover what is Multi-Party Computation and why CISOs should pay attention to this technology for encryption key, storage and managementJan 17
Aditya SinghinSilence LaboratoriesDigital Inheritance Service for Bequest Finance Using SL’s MPC LibraryOne year ago, Silence Laboratories embarked on a groundbreaking partnership with Bequest Finance, revolutionizing the world of digital…May 22
Jay PrakashinSilence LaboratoriesA Compute Perspective of MPC-TSS: Paillier in ECDSA RevisitedYashvanth, Jay, and members at Silence LaboratoriesFeb 7, 2023