Most security experts are by now aware of the threat that the rise of quantum computing poses to modern cryptography. Shor’s quantum algorithm, in particular,
Tag: cyber
Building A Simple Neural Network Backdoor
Vulnerabilities in supply chains aren’t a new topic and have quite a bit of focus from both a hardware and software perspective. With this post,
Audit of AMIS’ Hierarchical Threshold Signature Scheme
AMIS implemented a hierarchical variant of threshold signatures, using different levels/ranks in its distributed key generation (DKG) and signing logic, based on a previous research paper.
An Introduction to Oblivious RAM (ORAM)
In this article we are going to have a look at a special kind of privacy-preserving cryptographic scheme: ORAMs. The acronym ORAM stands for Oblivious
5 Common CFP Submission Mistakes for Security Conferences
Throughout my years on the review board for Black Hat, I’ve seen quite a few mistakes in submissions. Many of these mistakes are ones I’ve
Differential privacy: a comparison of libraries
Note that this article is a hands-on, applied, comparison and does not try to explain all the details of differential privacy. For more background information