In this post, we discover a strange creature named Modulo Bias, learn how it is born, why it is so dangerous, and how to fight
Tag: cryptography
Audit of AMIS’ Hierarchical Threshold Signature Scheme
AMIS implemented a hierarchical variant of threshold signatures, using different levels/ranks in its distributed key generation (DKG) and signing logic, based on a previous research paper.
Detecting movement using motion vectors & functional encryption
We have already discussed what Functional Encryption is in a previous post and mentioned we are building a prototype leveraging FE to detect motion. Let’s
CVE-2020-0601: the ChainOfFools/CurveBall attack explained with PoC
On Tuesday the 14th of January 2020, in the frame of their first Patch Tuesday of 2020, Microsoft addressed a critical flaw discovered by the
Forget Homomorphic Encryption, Here Comes Functional Encryption
Have you ever heard of Functional Encryption (FE)? If so, you may be associating it with some sort of homomorphic encryption, which is not wrong,
Audit of KZen’s Multi-party ECDSA
KZen hired Kudelski Security to perform a security assessment of their Multi-party ECDSA library and provided us access to their source code and associated documentation.