-
from https://github.com/zcash/zcash/issues/2230
Ian Miers noticed that a pedersen hash is an exceptionally good application for this fast ECC. Pedersen hashes have been mentioned in papers spanning…
-
## Basic Information
**Name:** Delta Chat
**Category:** IM / Instant Messaging
**URL:** https://delta.chat
## Description
It's instant messaging, but using SMTP to send messages, IMAP to re…
-
https://github.com/mitre-attack/car/tree/master/implementations/bzar
> The BZAR project uses the Bro/Zeek Network Security Monitor to detect ATT&CK-based adversarial activity.
>
> MITRE ATT&CK i…
-
In reading through the STIX specification, it seems like Threat Actor fits the description of a MITRE ATT&CK Group better than Intrusion Set does, yet none of the Groups are expressed as Threat Actors…
-
After thinking about the contact tracing problem for a while it seems to me that it is not very different from the problem of secure, anonymous communication:
- As an individual, I add other indivi…
-
1) Would it make sense to add an introduction giving some motivation? In particular, explain that we are interested in better understanding the security of the adaptive root assumption for VDFs, batch…
-
## Description:
> I think it's time to split content on privacytools.io into two sections:
>
> Aimed at regular users who are looking for an easy to use alterantive for lets say "WhatsApp" and…
-
Hi need some guidance. How does stockpile work?
I see my agents under ADVERSARY PLUGIN in the UI.
I DO NOT see my same agents under the CHAIN UI Section.
My CONF/LOCAL.YML has it enabled.
…
-
I have a quick question: your baseline almost reaches the denoising model results. However, as far as I can see the baseline is a fairly standard adversarial training procedure that was also tested in…
-
arXiv论文跟踪