Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Magri, Bernardo"'
Autor:
Magri, Bernardo Caraponale
Com o surgimento da criptografia de chave pública, muito esforço foi feito para a criação de protocolos de criptografia e de assinatura que fossem comprovadamente seguros contra indivíduos maliciosos. Existem várias definições de segurança,
Autor:
Gino, Diego, Miceli, Elena, Giordano, Luca, Castaldo, Paolo, Mancini, Giuseppe, De Iuliis, Massimiliano, Mori, Michele, Deiana, Maurizio, Magrì, Bernardo
Publikováno v:
In Procedia Structural Integrity 2024 64:456-463
Autor:
Thyagarajan, Sri Aravinda Krishnan, Bhat, Adithya, Magri, Bernardo, Tschudi, Daniel, Kate, Aniket
Although blockchains aim for immutability as their core feature, several instances have exposed the harms with perfect immutability. The permanence of illicit content inserted in Bitcoin poses a challenge to law enforcement agencies like Interpol, an
Externí odkaz:
http://arxiv.org/abs/2001.00486
Bitcoin is an immutable permissionless blockchain system that has been extensively used as a public bulletin board by many different applications that heavily relies on its immutability. However, Bitcoin's immutability is not without its fair share o
Externí odkaz:
http://arxiv.org/abs/1901.03206
Publikováno v:
In Theoretical Computer Science 6 March 2021 859:1-36
Publikováno v:
In Theoretical Computer Science 6 February 2021 855:104-132
Publikováno v:
In Theoretical Computer Science 8 June 2020 820:91-122
Publikováno v:
David, B, Magri, B, Matt, C, Nielsen, J B & Tschudi, D 2022, GearBox : Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy . in CCS'22-Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security . Association for Computing Machinery, New York, pp. 683-696, 28th ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, United States, 07/11/2022 . https://doi.org/10.1145/3548606.3559375
David, B, Magri, B, Matt, C, Nielsen, J B & Tschudi, D 2022, GearBox : Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy . in CCS 2022-Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security . Proceedings of the ACM Conference on Computer and Communications Security, Association for Computing Machinery, pp. 683-696, 28th ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, United States, 7/11/22 . https://doi.org/10.1145/3548606.3559375
David, B, Magri, B, Matt, C, Nielsen, J B & Tschudi, D 2022, GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy . in CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security . https://doi.org/10.1145/3548606.3559375
David, B, Magri, B, Matt, C, Nielsen, J B & Tschudi, D 2022, GearBox : Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy . in CCS 2022-Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security . Proceedings of the ACM Conference on Computer and Communications Security, Association for Computing Machinery, pp. 683-696, 28th ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, United States, 7/11/22 . https://doi.org/10.1145/3548606.3559375
David, B, Magri, B, Matt, C, Nielsen, J B & Tschudi, D 2022, GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy . in CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security . https://doi.org/10.1145/3548606.3559375
Sharding is an emerging technique to overcome scalability issues on blockchain based public ledgers. Without sharding, every node in the network has to listen to and process all ledger protocol messages. The basic idea of sharding is to parallelize t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8e42db1aba8efb9d0ab1921f2c4251a6
https://pure.au.dk/portal/da/publications/gearbox(92e6de2d-cac1-4225-9f26-3550332c05ad).html
https://pure.au.dk/portal/da/publications/gearbox(92e6de2d-cac1-4225-9f26-3550332c05ad).html
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Chakraborty, S, Magri, B, Nielsen, J B & Venturi, D 2022, Universally Composable Subversion-Resilient Cryptography . in O Dunkelman & S Dziembowski (eds), Advances in Cryptology – EUROCRYPT 2022 : 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings . Springer, Lecture Notes in Computer Science (LNCS), vol. 13275, pp. 272-302, 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2022, Trondheim, Norway, 30/05/2022 . https://doi.org/10.1007/978-3-031-06944-4_10
Subversion attacks undermine security of cryptographic protocols by replacing a legitimate honest party’s implementation with one that leaks information in an undetectable manner. An important limitation of all currently known techniques for design
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::3ea694dd8b86f211682f57b8f13899d9
https://pure.au.dk/portal/da/publications/universally-composable-subversionresilient-cryptography(c1cb0eee-270d-468b-936f-a1b2a6f2c934).html
https://pure.au.dk/portal/da/publications/universally-composable-subversionresilient-cryptography(c1cb0eee-270d-468b-936f-a1b2a6f2c934).html