Q: In the MPC it's broken into two parts, what prevents a malicious input in the second part?
A: This will be caught later on in the protocol in the proof stage this will be caught, the two parties commit to their shares beforehand
#realworldcrypto
-
-
> SJCL affected Free corgi pix to someone who collects metrics on real world usage of the SJCL in the wild.
#realworldcryptoPrikaži ovu nit -
If we encrypt the same message twice, the nonce will* be different and the ciphertext will be different. * CAVEAT EMPTOR
#realworldcryptoPrikaži ovu nit -
-
Simplest attack is a minimal forgery (existential forgery), adversary must know content of the message, it might not be that important but it's still not generated by the original sender.
#realworldcryptopic.twitter.com/X1ibibpXF3
Prikaži ovu nit -
On its own may not mean much, but can be leveraged into more powerful attacks.
#realworldcryptoPrikaži ovu nit -
Universal forgery: for any nonce and message (possibly chosen by the adversary), can compute ciphertext and tag that will be accepted as legit
#realworldcryptoPrikaži ovu nit
Kraj razgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
crypto as in 'cryptography'
