eprint.iacr.org February 2022
02/17/2022
Learn Privacy-Enhancing Techniques with Cryptographic Games
www.manning.com February 2022
What is the funniest number in cryptography (Episode 2 )?
cryptosubtlety.medium.com February 2022
DNS Security, Part VII: Blockchain-based Name Systems and Transparency
educatedguesswork.org February 2022
On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy
arxiv.org February 2022
Estimating the Bit Security of Pairing-Friendly Curves
research.nccgroup.com February 2022
It’s been 20 years since “15” was factored on quantum hardware
research.ibm.com January 2022
How I got an FBI record at age 11 from dabbling in cryptography then got into more trouble
web.stanford.edu January 2022
An extremely casual code review of MetaMask’s crypto
blog.cryptographyengineering.com January 2022
Foundations of distributed consensus and blockchains
www.distributedconsensus.net December 2021
Disclosing Shamir’s Secret Sharing vulnerabilities and announcing ZKDocs
blog.trailofbits.com December 2021
Alpha-Rays: Key Extraction Attacks on Threshold ECDSA Implementations
eprint.iacr.org December 2021
SNARKBlock: Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs
eprint.iacr.org December 2021
Meet Kryptology: Coinbase’s Open Source Cryptography Library
blog.coinbase.com December 2021