Welcome to the 2018 Kudelski Security Black Hat Crypto Challenge. Test your skills and win some hardware wallets along with some cryptocurrency. Building on the
In posts of September 25 and 28 we described several optimizations to SPHINCS, a signature algorithm that only relies on hash functions’ security, as opposed to RSA
Many want to write a book, but what most people don’t realize is the actual extent to which it takes to write said book. Grueling
We’ve succesfully conducted a fault attack against EdDSA that allowed us to recover enough secret key material to produce fake signatures for any message in a way a verifier cannot detect.