“It’s not the voting that’s democracy; it’s the counting.” —Tom Stoppard For cryptography researchers, e-voting isn’t about voting machine or online voting, but is
If you were out in Las Vegas this year for DEF CON, you might have caught our very own Yolan Romailler and Nils Amiet from
Welcome to the 2018 Kudelski Security Black Hat Crypto Challenge. Test your skills and win some hardware wallets along with some cryptocurrency. Building on the
In posts of September 25 and 28 we described several optimizations to SPHINCS, a signature algorithm that only relies on hash functions’ security, as opposed to RSA
Many want to write a book, but what most people don’t realize is the actual extent to which it takes to write said book. Grueling
We’ve succesfully conducted a fault attack against EdDSA that allowed us to recover enough secret key material to produce fake signatures for any message in a way a verifier cannot detect.