Threshold schnorr with stateless deterministic signing from standard assumptions

F Garillot, Y Kondi, P Mohassel… - Advances in Cryptology …, 2021 - Springer
Schnorr's signature scheme permits an elegant threshold signing protocol due to its linear
signing equation. However each new signature consumes fresh randomness, which can be …

Two-round stateless deterministic two-party schnorr signatures from pseudorandom correlation functions

Y Kondi, C Orlandi, L Roy - Annual International Cryptology Conference, 2023 - Springer
Schnorr signatures are a popular choice due to their simplicity, provable security, and linear
structure that enables relatively easy threshold signing protocols. The deterministic variant of …

Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures

K Chalkias, F Garillot, Y Kondi, V Nikolaenko - Cryptographers' Track at …, 2021 - Springer
Schnorr's signature scheme provides an elegant method to derive signatures with security
rooted in the hardness of the discrete logarithm problem, which is a well-studied assumption …

Cryptographically Secure PseudoRandom Bit Generator for Wearable Technology

M Melosik, M Galan, M Naumowicz, P Tylczyński… - Entropy, 2023 - mdpi.com
This paper presents a prototype wearable Cryptographically Secure PseudoRandom Bit
Generator CSPRBG (wearable CSPRBG). A vest prototype has been fabricated to which an …

Trojan attack on the initialization of pseudo-random bit generators using synchronization of chaotic input sources

M Melosik, W Marszalek - IEEE Access, 2021 - ieeexplore.ieee.org
This paper deals with a safety problem of entropy sources in deterministic random bit
generators. An initialization input attack on a set of two pseudo-random generators using …

Comparative Analysis and Applications of Quantum Random Number Generators: Evaluating Efficiency, Statistical Properties, and Real-world Use Cases

OE Adetifa - 2024 - search.proquest.com
Randomness is a crucial part of computer science, finding usage in areas such as data
science, machine learning, and cryptography. Replication of true randomness (which is only …

CoLLIDE: CLoud Latency-based IDEntification

V Daza, R Di Pietro, F Lombardi, M Signorini - Procedia computer science, 2017 - Elsevier
As services steadily migrate to the Cloud, the availability of an overarching identity
framework has become a stringent need. Moreover, such an identity framework is now …

Safe-Record: segurança e privacidade para Registros Eletrônicos em Saúde na nuvem

SMPC Souza - 2016 - realp.unb.br
O mercado de computação em nuvem tornou disponível a equipes hospitalares e
acadêmicas um volume virtualmente ilimitado de recursos computacionais, os quais têm …

[PDF][PDF] A Survey on the Linux Random Number Generator

LI Shuai - gloryer.github.io
The Linux random number generator (LRNG) produces random data for many security
related applications and protocols. The generator is part of the Linux kernel open source …