Abstract: Elliptic Curve Cryptography (ECC) is extensively utilized in various security applications due to its high efficiency and security. The core operation in ECC, elliptic curve scalar ...
Abstract: Distributed computations, such as distributed matrix multiplication, can be vulnerable to significant security issues, notably Byzantine attacks. These attacks may target either worker nodes ...