Iñigo Querejeta Azurmendi
Iñigo Querejeta Azurmendi
## Content This PR implements batch-verification for STM certificates, and benchmarks the results. In the final verify of the aggregated multisignatures, we check a pairing equality, meaning that for a...
## Why Having such a testing environment would provide us with a benchmark environment mimicking the usage of Mithril in main-net without the need of having it running there. This...
## Why Transmute can result in undefined behaviour. Should be used only when there are no alternatives. ## What Some functions of the multi-signature use transmute to change between types...
## Why Certificate chain verification could be made more efficient ## What When verifying a chain of `n` certificates, we currently verify each individually. This means that we compute the...
I encountered a problem with the expansion of macros using build.rs. Here is a minimal example to point out the problems I'm having. I have the following `lib.rs`. ```rust //...
## Why In a discussion with @curiecrypt , the possible usage of SNARK-Pack for mithril came up as something potentially interesting. As an exploratory process, it would be interesting to...
Currently, KES signing keys do not contain the period to which they are evolved. This means there is no way to know in which evolution a key is at. This...
I'm proposing to use Cryptographically Secure RNGs. I also changed the deprecated notation of `try!()` to `?`, and put the tests in groups/mod.rs within a test module to only have...
We are changing the way the KES keys are handled, to increase the guarantees that the key is not copied to disk and safely deleted by mlocking the secret data....