1 code implementation • 31 Jan 2019 • Alberto Sonnino, Shehar Bano, Mustafa Al-Bassam, George Danezis
We present a family of replay attacks against sharded distributed ledgers, that target cross-shard consensus protocols, such as the recently proposed Chainspace and Omniledger.
Cryptography and Security
8 code implementations • 20 Feb 2018 • Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano, Sarah Meiklejohn, George Danezis
Coconut is a novel selective disclosure credential scheme supporting distributed threshold issuance, public and private attributes, re-randomization, and multiple unlinkable selective attribute revelations.
Cryptography and Security
no code implementations • 10 Nov 2017 • Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, George Danezis
The blockchain initially gained traction in 2008 as the technology underlying bitcoin, but now has been employed in a diverse range of applications and created a global market worth over $150B as of 2017.
Cryptography and Security
1 code implementation • 12 Sep 2017 • Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis
To evaluate our design, we build a Hardware Security Module that provides the highest level of assurance possible with COTS components.
Cryptography and Security
1 code implementation • 17 Aug 2017 • Jamie Hayes, George Danezis
Neural networks are known to be vulnerable to adversarial examples, inputs that have been intentionally perturbed to remain visually similar to the source input, but cause a misclassification.
Ranked #8 on Graph Classification on NCI1 (using extra training data)
2 code implementations • 19 Jul 2017 • Bogdan Kulynych, Wouter Lueks, Marios Isaakidis, George Danezis, Carmela Troncoso
Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand.
Cryptography and Security
1 code implementation • 22 May 2017 • Jamie Hayes, Luca Melis, George Danezis, Emiliano De Cristofaro
Generative models estimate the underlying distribution of a dataset to generate realistic samples according to that distribution.
1 code implementation • NeurIPS 2017 • Jamie Hayes, George Danezis
In this paper, we apply adversarial training techniques to the discriminative task of learning a steganographic algorithm.
no code implementations • 26 May 2015 • George Danezis, Sarah Meiklejohn
Current cryptocurrencies, starting with Bitcoin, build a decentralized blockchain-based transaction ledger, maintained through proofs-of-work that also generate a monetary supply.
Cryptography and Security