-
### Description of the feature you would like to add / User story
As a KubeOne user
I would like that KubeOne creates clusters that adhere to the CIS security recommendations
in order to have…
-
PayJoin (also called pay-to-end-point or P2EP) is a special type of CoinJoin between two parties where one party pays the other. This coinjoin type has different (probably better) privacy properties. …
-
## Use case
There are some systems in which there is a requirement for asymmetric cryptographic operations in execution contexts that cannot tolerate long-running functions. However, some asymmetri…
-
[ Began writing up some notes on this ~ Dec 3, 2021: ]
Can we allow voters to submit their votes, and have strong cryptographic confirmation that it was received, without ever revealing the links b…
-
# related:
- [x] xxx
- [x] xxx
-
To be added in ./docs and on zenroom.org
Based on: https://pad.dyne.org/sheet/#/2/sheet/view/vuub8UeTl-cpuLeh-EZ-3HqSmXB+7FtWHcms9nZL6Uc/
Shot:
![ZenroomSigs2](https://github.com/dyne/Zenroom…
-
some things that could make people shiver:
1. reuse of ed25519 keys for dh
2. use of experimental xoodyak construction
3. use of only 8 rounds of chacha
4. stuff I haven't though of
strongest a…
-
The docs should should explain how the vectors are tested and that can be checked
-
At the moment, threshold scheme(threshold signature scheme, threshold secret scheme) is the key component of ABFT consensus algorithm. We need to figure out the details and choose one solution.
Som…
-
### About MuSig
For multi-signature accounts and multi-party contracts we need to implement a n-of-n MuSig protocol ([overview](https://blockstream.com/2018/01/23/musig-key-aggregation-schnorr-sign…