## Attacks and Fixes on DKGs

I recently gave my first in-person lecture in almost two years since the pandemic began, and it was such a great experience. I talked about attacks and fixes for distributed key generation (DKG)

I recently gave my first in-person lecture in almost two years since the pandemic began, and it was such a great experience. I talked about attacks and fixes for distributed key generation (DKG)

I was invited to present FROST and to give recommendations for the standardization of Schnorr threshold signatures at the recent NIST workshop on standardization of threshold schemes! Overall, we got great feedback from

I am excited to say that the camera ready version of our publication "Mind the Gap: Ceremonies for Applied Secret Sharing" in the Privacy Enhancing Symposium 2020 is out! You can see a

Important Terms and Notation For the purposes of this post, it is important to understand a few basic notation and terms. We define further linear algebra terms in Part 1 . We will denote

This post gives a (hopefully!) simple introduction to lattices and hard problems based on lattices. In Part 2, we’ll look at one simple lattice-based key exchange, to understand how to use these underlying hard problems in cryptosystems.