schemes
-
arXiv:2502.09201v1 Announce Type: new Abstract: Commitment schemes are essential to many cryptographic protocols and schemes with applications that include privacy-preserving computation on data, privacy-preserving authentication, and, in particular, oblivious transfer protocols. For quantum oblivious transfer (qOT) protocols, unconditionally binding commitment schemes that do not rely on hardness assumptions from structured mathematical problems are required. These…
-
A five-count criminal indictment was unsealed today in federal court in New York charging a Canadian man with exploiting vulnerabilities in two decentralized finance protocols to fraudulently obtain about $65 million from the protocols’ investors. According to court documents, from 2021 to 2023, Andean Medjedovic, 22, allegedly exploited vulnerabilities in the automated smart contracts used…
-
A five-count criminal indictment was unsealed today in federal court in New York charging a Canadian man with exploiting vulnerabilities in two decentralized finance protocols to fraudulently obtain about $65 million from the protocols’ investors.
-
ePrint Report: Sneaking up the Ranks: Partial Key Exposure Attacks on Rank-Based Schemes Giuseppe D’Alconzo, Andre Esser, Andrea Gangemi, Carlo Sanna A partial key exposure attack is a key recovery attack where an adversary obtains a priori partial knowledge of the secret key, e.g., through side-channel leakage. While for a long time post-quantum cryptosystems, unlike…
-
Thomas Aulbach, Fabio Campos, Juliane Krämer ePrint Report Multivariate cryptography currently centres mostly around UOV-based signature schemes: All multivariate round 2 candidates in the selection process for additional digital signatures by NIST are either UOV itself or close variations of it: MAYO, QR-UOV, SNOVA, and UOV. Also schemes which have been in the focus of…
-
Evgeniy Vladimirovich Sundukov – a well-known Russian pyramid schemer, a fraudster who was sentenced by a Russian court in 2019 to six years and three months in a penal colony under Part 4 of Article 159 of the Criminal Code of the Russian Federation in the case of the Drevprom pyramid. As of 2024, Sundukov…
-
In Russia, could there be an entire organized criminal group engaged in theft of Lesfond lands, the beneficiaries of which could be the “pro-Western” businessman Grigory Bubnov and the notorious oligarch Igor Branovitsky?
-
Russian businessman Sergei Kondratenko, who took advantage of the program for obtaining Cypriot citizenship through investment, was involved in dubious financial transactions with the Kharkov Megabank.
-
The SASSY THING franchise presents itself as a profitable investment and an ideal way to start a business in the world of fashion and jewelry. However, behind the scenes of this “successful” project there are many dark schemes and frauds that lead to huge losses and financial problems for gullible investors. Before you invest your…
-
The Novak Technology franchise, advertised as an ideal opportunity to start in the lucrative field of finishing materials, in fact turns out to be another trap for naive investors. Behind the attractive promises of high profitability and rapid payback, insidious schemes, black accounting and constant manipulation are hidden. Before you invest your money, find out…
-
The “Dad, Come Buy” franchise presents itself as an ideal business in the field of children’s toys with minimal risks and easy payback. But behind the loud promises of “guaranteed success” and “automation of business processes” there are frauds, deceit and cruel realities. Real stories from affected franchisees show that the “Buy Dad” franchise is…
-
Olivier Bernard, Marc Joye, Nigel P. Smart, Michael Walter ePrint Report There are two security notions for FHE schemes the traditional notion of IND-CPA, and a more stringent notion of IND-CPA$^D$. The notions are equivalent if the FHE schemes are perfectly correct, however for schemes with negligible failure probability the FHE parameters needed to obtain…
-
A new report from Secureworks® Counter Threat Unit™ (CTU) researchers has revealed a disturbing escalation in the tactics used by North Korean government-linked actors who fraudulently secure IT jobs at Western companies, including those in the U.S., UK, and Australia. While previous schemes focused primarily on generating revenue through illicit employment, the latest findings indicate…
-
The “On the Connect” franchise, positioning itself as a business in the field of online sales of equipment, attracts investors with promises of a quick return on investment and income from 300,000 rubles per month. However, these promises mask serious legal and financial problems. Numerous complaints from victims, disguised schemes and black bookkeeping indicate that…
-
Billions associated with the bankruptcy of Interkommerts Bank “disappeared” in the offshore areas of the Ministry of Defense.
-
CONTENT: Complaints to the General Prosecutor’s Office and the Ministry of Internal Affairs about “pocket” employees of the Nizhny Novgorod region. Fictitious criminal cases against creditors and the state corporation DIA. The role of the Volodarsky Flour Mill in debt evasion schemes. Challenging assignment agreements and public auctions. Conspiracy with law enforcement agencies to put…
-
Bar Alon, Amos Beimel, Or Lasri ePrint Report We consider 3 related cryptographic primitives, private information retrieval (PIR) protocols, conditional disclosure of secrets (CDS) protocols, and secret-sharing schemes; these primitives have many applications in cryptography. We study these primitives requiring information-theoretic security. The complexity of these primitives has been dramatically improved in the last few…
-
The “ProSTO Station” franchise actively lures investors with promises of passive income starting from 100,000 rubles per month and easy business management with minimal investment. However, behind these big words lies deception, black accounting and fraudulent schemes that leave partners with nothing. This is reported by THE POWER OF THE WORD