ENCODE Doctoral NetworkWhat is a secret and how do we share them?by Johan Vester Dinesen, ENCODE Doctoral Candidate, Aalto UniversityNov 26
Kyodo TechThreshold Encryption for Secure Multi-Party CollaborationIn many cryptographic scenarios, there is a need to securely distribute a secret (e.g., an encryption key) among multiple participants such…Aug 1
l2xlShamir Secret Sharing: Where Threshold Signature BeginsThis paper describes the basic math used for sharing secrets among participants in a way that supports threshold signature creationNov 4Nov 4
Alon MurochSecret Shared Validator (SSV) — Phase 1 Testing SummaryPhase 1 Testing ResultsMay 6, 2021May 6, 2021
Amin RazaviTernoa Fortress: DKMS (Part I)Secret Sharing among a set of hardware TEE has been the fundamental design element in Ternoa Fortress from the first day. Secret sharing…Apr 10Apr 10
ENCODE Doctoral NetworkWhat is a secret and how do we share them?by Johan Vester Dinesen, ENCODE Doctoral Candidate, Aalto UniversityNov 26
Kyodo TechThreshold Encryption for Secure Multi-Party CollaborationIn many cryptographic scenarios, there is a need to securely distribute a secret (e.g., an encryption key) among multiple participants such…Aug 1
l2xlShamir Secret Sharing: Where Threshold Signature BeginsThis paper describes the basic math used for sharing secrets among participants in a way that supports threshold signature creationNov 4
Amin RazaviTernoa Fortress: DKMS (Part I)Secret Sharing among a set of hardware TEE has been the fundamental design element in Ternoa Fortress from the first day. Secret sharing…Apr 10
InAWS in Plain EnglishbyEkant Mate (AWS APN Ambassador)Text Encryption Methods for Securing Credentials and Secrets SharingLock, Encrypt, & Share: Text Encryption — Your Guide to Bulletproof Secrets Sharing!Aug 6, 20231
KChain SolutionsBequeath your crypto and safely manage a secret keyOne of the advantages and disadvantages of pure web 3.0 is the absence of an account (username + password) managed by a central entity. In…Nov 3, 2022