Post-quantum cryptography

DJ Bernstein, T Lange - Nature, 2017 - nature.com
Cryptography is essential for the security of online communication, cars and implanted
medical devices. However, many commonly used cryptosystems will be completely broken …

A survey on security challenges and solutions in the IOTA

M Conti, G Kumar, P Nerurkar, R Saha… - Journal of Network and …, 2022 - Elsevier
Wide-scale adoption of the Internet of Everything requires decentralized security,
responsibility, and trust among the stakeholders. All these can be achieved by a Distributed …

zkbridge: Trustless cross-chain bridges made practical

T Xie, J Zhang, Z Cheng, F Zhang, Y Zhang… - Proceedings of the …, 2022 - dl.acm.org
Blockchains have seen growing traction with cryptocurrencies reaching a market cap of over
1 trillion dollars, major institution investors taking interests, and global impacts on …

Internet of Things: A survey on the security of IoT frameworks

M Ammar, G Russello, B Crispo - Journal of Information Security and …, 2018 - Elsevier
Abstract The Internet of Things (IoT) is heavily affecting our daily lives in many domains,
ranging from tiny wearable devices to large industrial systems. Consequently, a wide variety …

Enhancing bitcoin security and performance with strong consistency via collective signing

EK Kogias, P Jovanovic, N Gailly, I Khoffi… - 25th usenix security …, 2016 - usenix.org
While showing great promise, Bitcoin requires users to wait tens of minutes for transactions
to commit, and even then, offering only probabilistic guarantees. This paper introduces …

Identity inference of genomic data using long-range familial searches

Y Erlich, T Shor, I Pe'er, S Carmi - Science, 2018 - science.org
Consumer genomics databases have reached the scale of millions of individuals. Recently,
law enforcement authorities have exploited some of these databases to identify suspects via …

Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX

W Wang, G Chen, X Pan, Y Zhang, XF Wang… - Proceedings of the …, 2017 - dl.acm.org
Side-channel risks of Intel SGX have recently attracted great attention. Under the spotlight is
the newly discovered page-fault attack, in which an OS-level adversary induces page faults …

Simple schnorr multi-signatures with applications to bitcoin

G Maxwell, A Poelstra, Y Seurin, P Wuille - Designs, Codes and …, 2019 - Springer
We describe a new Schnorr-based multi-signature scheme (ie, a protocol which allows a
group of signers to produce a short, joint signature on a common message) called MuSig …

Ring confidential transactions

S Noether, A Mackenzie - ledger, 2016 - ledgerjournal.org
This article introduces a method of hiding transaction amounts in the strongly decentralized
anonymous cryptocurrency Monero. Similar to Bitcoin, Monero is a cryptocurrency which is …

A formal security analysis of the signal messaging protocol

K Cohn-Gordon, C Cremers, B Dowling, L Garratt… - Journal of …, 2020 - Springer
The Signal protocol is a cryptographic messaging protocol that provides end-to-end
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …