Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
public:research:main [2024-01-18 15:50] – [Secure Multiparty Computation on limited devices] xjancarpublic:research:main [2024-01-18 15:50] (current) – [Open-source security tools] xjancar
Line 344: Line 344:
 The work leverages our expertise in the side-channel analysis of cryptographic hardware (especially relevant for the hardware wallets), scrutiny of cryptographic implementations (both builder's and attacker's perspective), and randomness testing (crucial to have non-biased private keys and non-leaking signatures). The work leverages our expertise in the side-channel analysis of cryptographic hardware (especially relevant for the hardware wallets), scrutiny of cryptographic implementations (both builder's and attacker's perspective), and randomness testing (crucial to have non-biased private keys and non-leaking signatures).
  
-<button collapse="cryptocurrencies">Find out more</button>+<button icon="fa fa-caret-down" collapse="cryptocurrencies">Find out more</button>
 <button  icon="fa fa-file-text-o">[[:publications:keywords:cryptocurrencies|Publications]]</button> <button  icon="fa fa-file-text-o">[[:publications:keywords:cryptocurrencies|Publications]]</button>
  
Line 395: Line 395:
  
  
-<button collapse="opentools">Find out more</button>+<button icon="fa fa-caret-down" collapse="opentools">Find out more</button>
 <button  icon="fa fa-file-text-o">[[:publications:keywords:opentools|Publications]]</button> <button  icon="fa fa-file-text-o">[[:publications:keywords:opentools|Publications]]</button>