
Latest
Feb
05

Emerging Threats in the Cryptocurrency Ecosystem: Malicious QR Codes
By: Roger A. Hallman
1 Introduction
Quick Response (QR) codes are two-dimensional objects which act as a sort of barcode,
9 min read
Jan
01

Understanding the Recent News of Quantum Attacks on Crypto
By: Roger A. Hallman and Shane Kosieradzki
1 Introduction
A late 2024 spate of articles in English language popular tech
11 min read
Nov
26

Emerging Trends in Cryptocurrency: Visual Seed Phrases
By: Roger A. Hallman
1 Introduction
The growth and adoption of blockchain technologies and cryptocurrency since Bitcoin’s public release
6 min read
Oct
29

Cryptocurrency Key Backup and Recovery Services: What options are available to investors and enthusiasts?
By: Roger A. Hallman
1 Introduction
The cryptocurrency ecosystem relies on trust and security [16], and key management is a
8 min read
Sep
24
Emerging Threats in the Cryptocurrency Ecosystem: Cryptocurrency Address Poisoning
By: Roger A. Hallman
1 Introduction
As blockchain-based cryptocurrencies such as Bitcoin and Ethereum have gained popularity, criminal actors are
9 min read
Aug
27

The Intersection of Modern Cryptography and Blockchain: How are Fully Homomorphic Encryption, Multiparty Computation, and Zero-knowledge Proofs useful in the cryptocurrency ecosystem?
By: Roger A. Hallman
1 Introduction
Blockchain technology utilizes cryptographic protocols [46] such as hash functions and digital signature schemes
19 min read
Jul
23

Game Theoretic Cyber Deception in DeFi
1 Introduction
Decentralized Finance (DeFi) [32] is a financial paradigm built on blockchain technologies, which facilitates peer-to-peer transactions without centralized,
14 min read
Apr
17

Can Large Language Models Improve Security and Confidence in Decentralized Finance?
By: Roger A. Hallman
1 Introduction
Smart contracts are one of the foundational technologies in the decentralized finance (DeFi) ecosystem.
11 min read
Feb
09

Neural Cryptanalysis – An Introduction to Attacking Cryptography with Deep Learning
Roger A. Hallman
1 Introduction
Machine learning and cryptography are two fields of technology that are fundamental to many of
16 min read
Dec
04

SIM Swapping Attacks for Digital Identity Theft: A Threat to Financial Services and Beyond
By: Roger A. Hallman
1 Introduction
The ever increasing use of mobile phones in society, particularly the prevalence of applications
14 min read