Mayowa Olatunji (@web3MIO)How Does Multi-Party Computation Affect Web3 Security?Incidents of compromised private keys, unauthorized access to sensitive information, and the relentless targeting of centralized points of…Sep 6
Niek J. BoumanC++ build systems: our transition from CMake to MesonWe develop our main product, Cranmera MPC engine, in C++20. Since C++ doesn’t come with a default build system like Rust’s Cargo, it means…Feb 22, 20211
Kyodo TechDistributed Key Generation and Ed25519 Threshold Signatures with FROST MPCThe Flexible Round-Optimized Schnorr Threshold (FROST) protocol by Chelsea Komlo et al. represents a significant advancement in the field…Aug 16Aug 16
COCAMPC: The Key to Unhackable Crypto Wallets?MPC Crypto Security: Unveiling the Future of Digital Asset ProtectionAug 19Aug 19
Mayowa Olatunji (@web3MIO)How Does Multi-Party Computation Affect Web3 Security?Incidents of compromised private keys, unauthorized access to sensitive information, and the relentless targeting of centralized points of…Sep 6
Niek J. BoumanC++ build systems: our transition from CMake to MesonWe develop our main product, Cranmera MPC engine, in C++20. Since C++ doesn’t come with a default build system like Rust’s Cargo, it means…Feb 22, 20211
Kyodo TechDistributed Key Generation and Ed25519 Threshold Signatures with FROST MPCThe Flexible Round-Optimized Schnorr Threshold (FROST) protocol by Chelsea Komlo et al. represents a significant advancement in the field…Aug 16
COCAMPC: The Key to Unhackable Crypto Wallets?MPC Crypto Security: Unveiling the Future of Digital Asset ProtectionAug 19
Rachata TosirisukinFinemaOverview, Applications, and Use Cases of Multi-Party Computation (MPC) for Key ManagementMulti-Party Computation (MPC) has recently emerged as one of the most promising techniques for protecting secrets such as cryptographic…Oct 15, 2022
Kyodo TechThreshold Encryption for Secure Multi-Party CollaborationIn many cryptographic scenarios, there is a need to securely distribute a secret (e.g., an encryption key) among multiple participants such…Aug 1
DuoKeyHow Multi-Party Computation (MPC) Works and Why It Matters for CISOsDiscover what is Multi-Party Computation and why CISOs should pay attention to this technology for encryption key, storage and managementJan 17