Privacy-Preserving Machine LearningExplores privacy-preserving techniques like secret sharing and homomorphic encryption for secure computations and data protection in machine learning.
Distributed Randomness: DrandExplores distributed randomness using Drand, covering cryptographic tools, key exchange, elliptic curve cryptography, and practical applications in blockchain systems.
Privacy-Preserving Crypto IIntroduces Secure Multiparty Computation techniques, covering theoretical frameworks, security models, and practical applications in privacy-preserving cryptography.
Raccoon Attack on TLS 1.2Explores the Raccoon Attack, a timing attack on TLS-DH(E) that exploits most significant bit oracles.
Public Key CryptographyExplores public key cryptography, enabling secure communication and key exchange between Alice and Bob.