research
∙
06/02/2020
Preventing Denial of Service Attacks in IoT Networks through Verifiable Delay Functions
Permissionless distributed ledgers provide a promising approach to deal ...
research
∙
12/24/2019
Smooth Operator – The Use of Smooth Integers in Fast Generation of RSA Keys
Primality generation is the cornerstone of several essential cryptograph...
research
∙
12/24/2019
On the Decentralized Generation of theRSA Moduli in Multi-Party Settings
RSA cryptography is still widely used. Some of its applications (e.g., d...
research
∙
07/18/2017