Guilherme Balena VersianiCrypto Pills #7: Building Verifiable Secret Sharing with Elliptic Curves in GoAs see in Crypto Pills #6, Verifiable Secret Sharing is a cryptographic technique that allows a secret to be divided into multiple parts…Nov 5
InThe Bitcoin HolebyThe Bitcoin HoleHow to Safely store your Hardware Wallet Seed PhraseSome good practices to safely store your Cold Wallet Seed Phrase.Apr 12
Mayowa Olatunji (@web3MIO)How Does Multi-Party Computation Affect Web3 Security?Incidents of compromised private keys, unauthorized access to sensitive information, and the relentless targeting of centralized points of…Sep 6Sep 6
InBitHyvebyAnant TapadiaShamir’s Secret Sharing or MultiSig? (with update)Hexa’s security scheme tries to combines the two in a new way. Let us understand the benefits and the challengesSep 29, 2021Sep 29, 2021
Andrey MakarovKey management system for beginnersNot so long ago, at a muggle job, we had a question about storing private keys for various services. In the process, we found several…Jul 17Jul 17
Guilherme Balena VersianiCrypto Pills #7: Building Verifiable Secret Sharing with Elliptic Curves in GoAs see in Crypto Pills #6, Verifiable Secret Sharing is a cryptographic technique that allows a secret to be divided into multiple parts…Nov 5
InThe Bitcoin HolebyThe Bitcoin HoleHow to Safely store your Hardware Wallet Seed PhraseSome good practices to safely store your Cold Wallet Seed Phrase.Apr 12
Mayowa Olatunji (@web3MIO)How Does Multi-Party Computation Affect Web3 Security?Incidents of compromised private keys, unauthorized access to sensitive information, and the relentless targeting of centralized points of…Sep 6
InBitHyvebyAnant TapadiaShamir’s Secret Sharing or MultiSig? (with update)Hexa’s security scheme tries to combines the two in a new way. Let us understand the benefits and the challengesSep 29, 2021
Andrey MakarovKey management system for beginnersNot so long ago, at a muggle job, we had a question about storing private keys for various services. In the process, we found several…Jul 17
김인근Shamir’s Secret Sharing (SSS): Uncovering the Cryptography Hidden in Triple SLet’s take a look at how Sharmir’s Secret Sharing (SSS) works and where it can be applied.Apr 3