In this post, we discover a strange creature named Modulo Bias, learn how it is born, why it is so dangerous, and how to fight

In this post, we discover a strange creature named Modulo Bias, learn how it is born, why it is so dangerous, and how to fight
AMIS implemented a hierarchical variant of threshold signatures, using different levels/ranks in its distributed key generation (DKG) and signing logic, based on a previous research paper.
On Tuesday the 14th of January 2020, in the frame of their first Patch Tuesday of 2020, Microsoft addressed a critical flaw discovered by the
Have you ever heard of Functional Encryption (FE)? If so, you may be associating it with some sort of homomorphic encryption, which is not wrong,
Binance created an open source software library available on Github implementing a threshold ECDSA signature scheme (TSS), and hired Kudelski Security to perform a security
Hello everyone, today we are happy to announce FumbleChain, a purposefully vulnerable blockchain implementation. This project has been a labor of love for the Research