Threshold schnorr with stateless deterministic signing from standard assumptions
Schnorr's signature scheme permits an elegant threshold signing protocol due to its linear
signing equation. However each new signature consumes fresh randomness, which can be …
signing equation. However each new signature consumes fresh randomness, which can be …
Two-round stateless deterministic two-party schnorr signatures from pseudorandom correlation functions
Schnorr signatures are a popular choice due to their simplicity, provable security, and linear
structure that enables relatively easy threshold signing protocols. The deterministic variant of …
structure that enables relatively easy threshold signing protocols. The deterministic variant of …
Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures
Schnorr's signature scheme provides an elegant method to derive signatures with security
rooted in the hardness of the discrete logarithm problem, which is a well-studied assumption …
rooted in the hardness of the discrete logarithm problem, which is a well-studied assumption …
Cryptographically Secure PseudoRandom Bit Generator for Wearable Technology
M Melosik, M Galan, M Naumowicz, P Tylczyński… - Entropy, 2023 - mdpi.com
This paper presents a prototype wearable Cryptographically Secure PseudoRandom Bit
Generator CSPRBG (wearable CSPRBG). A vest prototype has been fabricated to which an …
Generator CSPRBG (wearable CSPRBG). A vest prototype has been fabricated to which an …
Trojan attack on the initialization of pseudo-random bit generators using synchronization of chaotic input sources
M Melosik, W Marszalek - IEEE Access, 2021 - ieeexplore.ieee.org
This paper deals with a safety problem of entropy sources in deterministic random bit
generators. An initialization input attack on a set of two pseudo-random generators using …
generators. An initialization input attack on a set of two pseudo-random generators using …
Comparative Analysis and Applications of Quantum Random Number Generators: Evaluating Efficiency, Statistical Properties, and Real-world Use Cases
OE Adetifa - 2024 - search.proquest.com
Randomness is a crucial part of computer science, finding usage in areas such as data
science, machine learning, and cryptography. Replication of true randomness (which is only …
science, machine learning, and cryptography. Replication of true randomness (which is only …
CoLLIDE: CLoud Latency-based IDEntification
V Daza, R Di Pietro, F Lombardi, M Signorini - Procedia computer science, 2017 - Elsevier
As services steadily migrate to the Cloud, the availability of an overarching identity
framework has become a stringent need. Moreover, such an identity framework is now …
framework has become a stringent need. Moreover, such an identity framework is now …
Safe-Record: segurança e privacidade para Registros Eletrônicos em Saúde na nuvem
SMPC Souza - 2016 - realp.unb.br
O mercado de computação em nuvem tornou disponível a equipes hospitalares e
acadêmicas um volume virtualmente ilimitado de recursos computacionais, os quais têm …
acadêmicas um volume virtualmente ilimitado de recursos computacionais, os quais têm …
[PDF][PDF] A Survey on the Linux Random Number Generator
LI Shuai - gloryer.github.io
The Linux random number generator (LRNG) produces random data for many security
related applications and protocols. The generator is part of the Linux kernel open source …
related applications and protocols. The generator is part of the Linux kernel open source …