Fresh off the shelf at the silence factory. 🛠️ đźŹ
Multiparty Computation (MPC) protocols to distribute signing authority for ECDSA are now a standard best practice for managing signing keys.
May 16, 2024
A Compute Perspective of MPC-TSS: Paillier in ECDSA Revisited.A Compute Perspective of MPC-TSS: Paillier in ECDSA Revisited.A Compute Perspective of MPC-TSS: Pa
July 11, 2023
Why is the Threshold Signature Scheme better than Multi-Sig and Shamir’s Secret?Why is the Threshold Signature Scheme better than Multi-Sig and Shamir’s Secret?
A Discussion On Collusion-Resistant Protocols In Secret Sharing. A Discussion On Collusion-Resistant Protocols In Secret Sharing. A Discussion On Collusion-Resi
Offline Proactive Refresh: Strengthening Threshold Signature Wallets. Offline Proactive Refresh: Strengthening Threshold Signature Wallets. Offline Proactive Re
How Silent Shard is Transforming Authentication Support for Crypto Wallets and Exchanges?
How can MFA solve the burning issue of Cyber Security in Healthcare?How can MFA solve the burning issue of Cyber Security in Healthcare?How can MFA solve the bu
How is ETH 2.0 going to enhance the security landscape? How is ETH 2.0 going to enhance the security landscape? How is ETH 2.0 going to enhance the security lan
Self-Custody, Custodial, Non-Custodial, and similar such jargon are loosely used across the industry...
Enabling any Web Service to safely use threshold signatures through MetaMask Snaps — The Silent Snap Shard.
March 5, 2024
SilentRide: Effortless Authentication Library for Mobility. SilentRide: Effortless Authentication Library for Mobility, SilentRide: Effortless Authentication Li
The Third Dimension of User-Centric Studies for Decentralised Systems. User-Centric Studies for Decentralised Systems
Why Online Trading Platforms Need Special Attention for Multi-Factor Authentication (MFA)?Why Online Trading Platforms Need Special Attention for Multi-Factor A