BtcTurk Suffers $48 Million Private Key Compromise across Seven Blockchains
A critical private key compromise enabled attackers to drain $48 million from BtcTurk hot wallets, exposing systemic risks in centralized exchange key management.
Adaptive BLS Threshold Signatures Bolster Distributed System Security
This research introduces a novel BLS threshold signature scheme that maintains security against dynamic, adaptive adversaries, critical for robust decentralized systems.
BtcTurk Exchange Suffers $48 Million Private Key Compromise
A compromised private key allowed attackers to drain hot wallets across seven blockchains, exposing critical operational security failures.
Distributed Key Management Enhances Central Bank Digital Currency Security
This research validates threshold signatures for CBDCs, distributing key control to eliminate single points of failure and bolster financial system resilience.
Truflation Wallets Compromised in $5 Million Malware Attack
Malware compromised Truflation's operational security, enabling unauthorized access to treasury and personal funds, highlighting critical risks in key management.
Shibarium Bridge Compromised via Flash Loan and Validator Key Exploit
A critical vulnerability in Shibarium's cross-chain bridge allowed an attacker to manipulate governance tokens and seize validator control, leading to a multi-million dollar asset drain.
Fully Homomorphic Encryption Enables Confidential Computation for Smart Contracts
This research introduces a protocol for confidential smart contracts, leveraging Fully Homomorphic Encryption to process encrypted data on-chain, securing sensitive information in decentralized applications.
Unifying Threshold Cryptography for Robust Distributed Systems
Thetacrypt simplifies integrating diverse threshold cryptographic schemes, securing distributed trust and blockchain operations against critical vulnerabilities.
Shibarium Bridge Compromised by Validator Key Control and Flash Loan Exploit
A critical governance flaw in the Shibarium bridge allowed an attacker to manipulate validator control via a flash loan, enabling unauthorized asset exfiltration.
