all InfoSec news
The Last Challenge Attack: Exploiting a Vulnerable Implementation of the Fiat-Shamir Transform in a KZG-based SNARK
March 5, 2024, 9:42 a.m. |
IACR News www.iacr.org
ePrint Report: The Last Challenge Attack: Exploiting a Vulnerable Implementation of the Fiat-Shamir Transform in a KZG-based SNARK
Oana Ciobotaru, Vesselin Velichkov, Maxim Peter
The Fiat-Shamir transform [1] is a well-known and widely employed technique for converting sound public-coin interactive protocols into sound non-interactive protocols. Even though the transformation itself is relatively clear and simple, some implementations choose to deviate from the specifications, for example for performance reasons. In this short note, we present a vulnerability arising from such a …
attack challenge eprint report exploiting fiat implementation non peter protocols public report sound transform vulnerable well-known
More from www.iacr.org / IACR News
A Deniability Analysis of Signal's Initial Handshake PQXDH
3 days, 3 hours ago |
www.iacr.org
BGJ15 Revisited: Sieving with Streamed Memory Access
3 days, 3 hours ago |
www.iacr.org
Quantum Key-Revocable Dual-Regev Encryption, Revisited
3 days, 3 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Technical Support Specialist (Cyber Security)
@ Sigma Software | Warsaw, Poland
OT Security Specialist
@ Adani Group | AHMEDABAD, GUJARAT, India
FS-EGRC-Manager-Cloud Security
@ EY | Bengaluru, KA, IN, 560048