Overview
Syllabus
Intro
Attacking Threshold Wallets
Threshold signature schemes TSST
Forget & Forgive Setup
Golden Shoe Setup
Golden Shoe Vulnerability
Golden Shoe Exploit
Golden Shoe Mitigation
Takeaways
From Crypto-Paper to Crypto-Currency: the Cardano Consensus Layer
Overview
Distributed Computation over a Netwo
Consensus Layer of Cardano
Theory + Practice Interplay
Connecting theory with implementation
Block-Fetch, Forecasting, Denial of Service
What are Randomness Beacons?
Important Beacon Parameters
Constructions: Verifiable Random Functic (VRF)
Constructions: Threshold VRFs
Lock Puzzles and Verifiable Delay Functions
Taught by
TheIACR