Fresh off the shelf at the silence factory. 🛠️ đźŹ
Multiparty Computation (MPC) protocols to distribute signing authority for ECDSA are now a standard best practice for managing signing keys.
May 16, 2024
Offline Proactive Refresh: Strengthening Threshold Signature Wallets. Offline Proactive Refresh: Strengthening Threshold Signature Wallets. Offline Proactive Re
July 11, 2023
A Discussion On Collusion-Resistant Protocols In Secret Sharing. A Discussion On Collusion-Resistant Protocols In Secret Sharing. A Discussion On Collusion-Resi
Why is the Threshold Signature Scheme better than Multi-Sig and Shamir’s Secret?Why is the Threshold Signature Scheme better than Multi-Sig and Shamir’s Secret?
A Compute Perspective of MPC-TSS: Paillier in ECDSA Revisited.A Compute Perspective of MPC-TSS: Paillier in ECDSA Revisited.A Compute Perspective of MPC-TSS: Pa
Okto’s Decentralized Wallet Network is secured by Silence Laboratories’ ultra-fast DKLS23 algorithm and advanced MPC technology. Silence’s unique cryptographic
June 26, 2025
Enabling any Web Service to safely use threshold signatures through MetaMask Snaps — The Silent Snap Shard.
March 5, 2024
How is ETH 2.0 going to enhance the security landscape? How is ETH 2.0 going to enhance the security landscape? How is ETH 2.0 going to enhance the security lan
How Silent Shard is Transforming Authentication Support for Crypto Wallets and Exchanges?
SilentRide: Effortless Authentication Library for Mobility. SilentRide: Effortless Authentication Library for Mobility, SilentRide: Effortless Authentication Li
How can MFA solve the burning issue of Cyber Security in Healthcare?How can MFA solve the burning issue of Cyber Security in Healthcare?How can MFA solve the bu
Why Online Trading Platforms Need Special Attention for Multi-Factor Authentication (MFA)?Why Online Trading Platforms Need Special Attention for Multi-Factor A
Self-Custody, Custodial, Non-Custodial, and similar such jargon are loosely used across the industry...
The Third Dimension of User-Centric Studies for Decentralised Systems. User-Centric Studies for Decentralised Systems