A Security Engineer's Guide to Reviewing Core Blockchain Nodes
A comprehensive methodology for conducting security reviews of blockchain infrastructure, using Reth as a practical example
A comprehensive methodology for conducting security reviews of blockchain infrastructure, using Reth as a practical example
A rogue key attack on Gennaro et al. DKG for polynomials of excessive degree, allowing full control of the private key