Using Proxies: An Essential Guide
A practical guide to safe choices and best practices when deploying proxies for a project
Rogue Key Attack on Gennaro et al. DKG for Polynomials of Excessive Degree
A rogue key attack on Gennaro et al. DKG for polynomials of excessive degree, allowing full control of the private key