zekrom is an open-source library of arithmetization-oriented constructions for zkSNARK circuits. It was created as part of the MSc thesis work of Laurent Thoeny on
Reducing The Impact of Prompt Injection Attacks Through Design
On a daily basis, it seems that people think they’ve cracked the prompt injection conundrum. The reality is they all fail. By the very nature
Audit of drand Timelock Encryption
The Drand team at Protocol Labs recently released a timelock encryption based on the Drand threshold network run by the League of entropy. This timelock encryption construction ensures a ciphertext will be decryptable only after some specified time has
passed and not before. The cryptographic construction of the timelock encryption was recently presented in depth during the Real World Cryptography conference.
3CX Supply Chain Attack ‘SmoothOperator’
Written by Anton Jörgensson, Eric Dodge & Yann Lehmann of the Kudelski Security Threat Detection & Research Team Updated on April 5th. We may update
Dissecting and Detecting Babuk ransomware Cryptography
Written by Sylvain Pelissier and Antonio De La Piedra of the Kudelski Security Research Team The Babuk or Babyk ransomware was detected two years ago.
Multiple CVEs in threshold cryptography implementations
Introduction io.finnet hired us to perform a code audit of their threshold ECDSA signature implementation called tss-lib based on the paper UC Non-Interactive, Proactive, Threshold