Co-authored by Nils Amiet and André Nicoulin 1. Introduction In this memo, we address the issue of the “Dangerous Delegated OCSP Responder Certificate” [1]. We propose
Tag: cybersecurity
Building A Simple Neural Network Backdoor
Vulnerabilities in supply chains aren’t a new topic and have quite a bit of focus from both a hardware and software perspective. With this post,
Code Audit of Boxcryptor
Boxcryptor is a software developed by Secomba GmbH which focuses on protecting files stored on external cloud providers by over-encrypting the files and even
Audit of AMIS’ Hierarchical Threshold Signature Scheme
AMIS implemented a hierarchical variant of threshold signatures, using different levels/ranks in its distributed key generation (DKG) and signing logic, based on a previous research paper.
An Introduction to Oblivious RAM (ORAM)
In this article we are going to have a look at a special kind of privacy-preserving cryptographic scheme: ORAMs. The acronym ORAM stands for Oblivious
5 Common CFP Submission Mistakes for Security Conferences
Throughout my years on the review board for Black Hat, I’ve seen quite a few mistakes in submissions. Many of these mistakes are ones I’ve