research
          
      
      ∙
      06/02/2020
    Preventing Denial of Service Attacks in IoT Networks through Verifiable Delay Functions
Permissionless distributed ledgers provide a promising approach to deal ...
          
            research
          
      
      ∙
      12/24/2019
    Smooth Operator – The Use of Smooth Integers in Fast Generation of RSA Keys
Primality generation is the cornerstone of several essential cryptograph...
          
            research
          
      
      ∙
      12/24/2019
    On the Decentralized Generation of theRSA Moduli in Multi-Party Settings
RSA cryptography is still widely used. Some of its applications (e.g., d...
          
            research
          
      
      ∙
      07/18/2017