kryptology
kryptology copied to clipboard
Modulus N was likely intended for calculating y_i = x_i^M at ProvePSF, Figure 15
To keep the documentation complete (avoiding the need to get Paillier encrypt/decrypt specification), one would include L(x) function definition: if N \not | (x-1) return wrong_ciphertext else return \frac {x-1}...
When running the program at `test/dkg/bls/main.go`, it panics unexpectedly. Command: `go run main.go -t 3 -n 4` Panic message: panic: runtime error: invalid memory address or nil pointer dereference` Machine:...
BLS12-381 and BLS12-377 both need to be updated to be constant. Side benefit is compilation to ARM and AMD
The proof is wrong. It says: > wlog p < q so > (p+q)/pq
The IETF spec describing the I2OSP function describes it as returning an error for invalid (too small) n. This would probably make sense; otherwise, it produces truncated results. e.g., I2OSP(65536,...
Right now errors are in the `internal` directory. That means a repository importing this one cannot import those error variables and thus cannot check the error with `errors.Is(err, ErrXYZ)`. One...