SlideShare a Scribd company logo
1 of 60
Download to read offline
1
HydRand: Efficient Continuous
Distributed Randomness
Philipp Schindler*
, Aljosha Judmayer*
, Nicholas Stifter*†
,
Edgar Weippl*†
IEEE S&P 2020
SBA Research, 2020
*
SBA Research, †
TU Wien
2
https://xkcd.com/221
3
4
Local vs. Distributed Randomness
Local
• os-builtins primitives,
e.g. /dev/urandom
• dedicated hardware devices
• (typically) kept secret
• individually used, e.g. seed
for cryptographic keys
Distributed
• built on-top of local primitives
• multi-party protocol
• secret first, but published at a
specific point in time
• collectively used
5
A Randomness Beacon
We propose a solution employing a “beacon” which emits at
regularly spaced time intervals, randomly chosen integers in
the range 1 ⩽ i ⩽ k. (Rabin, 1983)
6
Desired Properties
?
Bias-Resistance
Scalability
Unpredictability Liveness
Public-Verifiability
Energy Efficiency
Guaranteed Output Delivery
7
Motivation & Applications
Selection Processes
• gambling & lotteries services, jury selection, sport draws
Blockchain & BFT Protocols
• leader & committee selection, sharding, Smart Contracts
(Online-)Gaming
• shuffling, distribution of in-game items, team/tournament
assignment
Cryptographic Protocols
• parameter generation, privacy preserving messaging,
anonymous browsing
8
Cryptographic Building Blocks
Digital Signatures
• Ed25519
Cryptographic Hash Functions
• SHA3-256
Public-Verifiable Secret Sharing (PVSS)
• Scrape's PVSS
9
Secret Sharing
Distribution Reconstruction
S1
S2
S3
S4
S5
S
S
S2
S4
S5
dealer
participants
subset of participants
10
(Publicly-Verifiable) Secret Sharing
Shamir’s Secret Sharing
• (t, n) threshold scheme
• dealer distributes secret value
s to n participants
• any set of at least t participants
can reconstruct s
• dealer must be trusted
PVSS
• (t, n) threshold scheme
• correctness of shares can be
verified prior to reconstruction
• uses non-interactive zero
knowledge proofs
• malicious dealers are
detected
11
System and Threat Model
Fixed set of known participants
• n nodes total, f may deviate arbitrarily from the protocol
• standard n = 3f + 1 assumption
• t = f + 1 for PVSS threshold
Network
• synchronous, known upper bound on network delay
• authenticated point-to-point messaging channels
No DKG
No common broadcast channel
12
High-Level View on HydRand
Setup
• exchange public keys & initial PVSS shares
• determine initial random beacon value
Execution
• propose phase
• acknowledge phase
• vote phase
⇒ new random beacon value
⇒ new leader
round
13
Propose Acknowledge Vote Propose...
leader
14
Propose Acknowledge Vote Propose...
leader
S1 S1
S3S4
shares for new secret
(encrypted)
S revealed secret
15
Propose Acknowledge Vote Propose...
16
Propose Acknowledge Vote Propose...
S revealed secret
H( ) sig( )
17
Propose Acknowledge Vote Propose...
18
confirm vote
Propose Acknowledge Vote Propose...
19
confirm vote
Propose Acknowledge Vote Propose...
S2
share for secret
(decrypted)
recover vote
20
confirm vote
Propose Acknowledge Vote Propose...
Compute beacon output
confirm vote
confirm vote
confirm vote
S revealed secret
S revealed secret
S revealed secret
revealed secretS
21
confirm vote
Propose Acknowledge Vote Propose...
S2
share for secret
(decrypted)
recover vote
Compute beacon output
confirm vote
confirm vote
confirm vote
S revealed secret
S revealed secret
S revealed secret
revealed secret
S2
share for secret
(decrypted)
recover vote
S5
share for secret
(decrypted)
recover vote
S2
S4
S5
recovered secret
S
S
22
confirm vote
Propose Acknowledge Vote Propose...
S2
share for secret
(decrypted)
recover vote
Compute beacon output
confirm vote
confirm vote
confirm vote
S revealed secret
S revealed secret
S revealed secret
revealed secret
S2
share for secret
(decrypted)
recover vote
S5
share for secret
(decrypted)
recover vote
S2
S4
S5
recovered secret
S
S
=
23
Propose Acknowledge Vote Propose...
Compute beacon output
S revealed secret
S revealed secret
S revealed secret
revealed secret
S2
S4
S5
recovered secret
S
S
=
HRprev Rnew
24
Propose Acknowledge Vote Propose...
Derive next leader
Rnew
Leader is derived via previous output
• non-interactively
• uniformly at random from the set of potential leaders
Potential leaders:
• were not recently selected as leader
• did fulfil their duties as leader so far
25
Desired Properties
?
Bias-Resistance
Scalability
Unpredictability Liveness
Public-Verifiability
Energy Efficiency
Guaranteed Output Delivery
26
Security Analysis: Unpredictability
Guaranteed after f+1 rounds
Additional probabilistic guarantees
27
Desired Properties
?
Bias-Resistance
Scalability
Unpredictability Liveness
Public-Verifiability
Energy Efficiency
Guaranteed Output Delivery
28
Desired Properties
?
Bias-Resistance
Scalability
Unpredictability Liveness
Public-Verifiability
Energy Efficiency
Guaranteed Output Delivery
29
Desired Properties
?
Bias-Resistance
Scalability
Unpredictability Liveness
Public-Verifiability
Energy Efficiency
Guaranteed Output Delivery
30
Desired Properties
?
Bias-Resistance
Scalability
Unpredictability Liveness
Public-Verifiability
Energy Efficiency
Guaranteed Output Delivery
31
Scalability / Throughput
https://github.com/PhilippSchindler/hydrand
32
Evaluation Results
Verification
• duration: ~57ms
• proof size: ~26kB
Network bandwidth CPU Utilization
33
Desired Properties
?
Bias-Resistance
Scalability
Unpredictability Liveness
Public-Verifiability
Energy Efficiency
Guaranteed Output Delivery
34
Desired Properties
?
Bias-Resistance
Scalability
Unpredictability Liveness
Public-Verifiability
Energy Efficiency
Guaranteed Output Delivery
35
Outlook
Scalability improvements
• threshold cryptography
• pre-sharing PVSS secrets
• multiple threads for verification
Rejoining / dynamic participation
Different model
• partially synchronous network
• n = 2f + 1 threshold model
36
37
Random numbers should not be generated with a method
chosen at random. (Donald Knuth)
38
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl

More Related Content

More from SBA Research

SBA Live Academy, Rechtliche Risiken mit externen Mitarbeitern
SBA Live Academy, Rechtliche Risiken mit externen MitarbeiternSBA Live Academy, Rechtliche Risiken mit externen Mitarbeitern
SBA Live Academy, Rechtliche Risiken mit externen MitarbeiternSBA Research
 
SBA Live Academy, What the heck is secure computing
SBA Live Academy, What the heck is secure computingSBA Live Academy, What the heck is secure computing
SBA Live Academy, What the heck is secure computingSBA Research
 
Tools & techniques, building a dev secops culture at mozilla sba live a...
Tools & techniques, building a dev secops culture at mozilla   sba live a...Tools & techniques, building a dev secops culture at mozilla   sba live a...
Tools & techniques, building a dev secops culture at mozilla sba live a...SBA Research
 
SBA Live Academy - Secure Containers for Developer by Mathias Tausig
SBA Live Academy - Secure Containers for Developer by Mathias TausigSBA Live Academy - Secure Containers for Developer by Mathias Tausig
SBA Live Academy - Secure Containers for Developer by Mathias TausigSBA Research
 
SBA Live Academy - After the overflow: self-defense techniques (Linux Kernel)...
SBA Live Academy - After the overflow: self-defense techniques (Linux Kernel)...SBA Live Academy - After the overflow: self-defense techniques (Linux Kernel)...
SBA Live Academy - After the overflow: self-defense techniques (Linux Kernel)...SBA Research
 
SBA Live Academy - Passwords: Policy and Storage with NIST SP800-63b by Jim M...
SBA Live Academy - Passwords: Policy and Storage with NIST SP800-63b by Jim M...SBA Live Academy - Passwords: Policy and Storage with NIST SP800-63b by Jim M...
SBA Live Academy - Passwords: Policy and Storage with NIST SP800-63b by Jim M...SBA Research
 
SBA Live Academy - Threat Modeling 101 – eine kurze aber praxisnahe Einführun...
SBA Live Academy - Threat Modeling 101 – eine kurze aber praxisnahe Einführun...SBA Live Academy - Threat Modeling 101 – eine kurze aber praxisnahe Einführun...
SBA Live Academy - Threat Modeling 101 – eine kurze aber praxisnahe Einführun...SBA Research
 
SBA Live Academy - Angriffe gegen das Stromnetz – Wenn der Strom nicht mehr a...
SBA Live Academy - Angriffe gegen das Stromnetz – Wenn der Strom nicht mehr a...SBA Live Academy - Angriffe gegen das Stromnetz – Wenn der Strom nicht mehr a...
SBA Live Academy - Angriffe gegen das Stromnetz – Wenn der Strom nicht mehr a...SBA Research
 
SBA Live Academy - Physical Attacks against (I)IoT-Devices, Embedded Devices,...
SBA Live Academy - Physical Attacks against (I)IoT-Devices, Embedded Devices,...SBA Live Academy - Physical Attacks against (I)IoT-Devices, Embedded Devices,...
SBA Live Academy - Physical Attacks against (I)IoT-Devices, Embedded Devices,...SBA Research
 
SBA Live Academy: Cyber Resilience - Failure is not an option by Simon Tjoa
SBA Live Academy: Cyber Resilience - Failure is not an option by Simon TjoaSBA Live Academy: Cyber Resilience - Failure is not an option by Simon Tjoa
SBA Live Academy: Cyber Resilience - Failure is not an option by Simon TjoaSBA Research
 
SBA Live Academy: Datenschutz Teil 1: Wozu Datenschutzgesetze? by Gerald Sendera
SBA Live Academy: Datenschutz Teil 1: Wozu Datenschutzgesetze? by Gerald SenderaSBA Live Academy: Datenschutz Teil 1: Wozu Datenschutzgesetze? by Gerald Sendera
SBA Live Academy: Datenschutz Teil 1: Wozu Datenschutzgesetze? by Gerald SenderaSBA Research
 
SBA Live Academy: A Primer in Single Page Application Security by Thomas Konrad
SBA Live Academy: A Primer in Single Page Application Security by Thomas KonradSBA Live Academy: A Primer in Single Page Application Security by Thomas Konrad
SBA Live Academy: A Primer in Single Page Application Security by Thomas KonradSBA Research
 
SBA Live Academy: Software Security – Towards a Mature Lifecycle and DevSecOp...
SBA Live Academy: Software Security – Towards a Mature Lifecycle and DevSecOp...SBA Live Academy: Software Security – Towards a Mature Lifecycle and DevSecOp...
SBA Live Academy: Software Security – Towards a Mature Lifecycle and DevSecOp...SBA Research
 
SBA Live Academy: Remote Access – Top Security Challenges – Teil 2 by Günther...
SBA Live Academy: Remote Access – Top Security Challenges – Teil 2 by Günther...SBA Live Academy: Remote Access – Top Security Challenges – Teil 2 by Günther...
SBA Live Academy: Remote Access – Top Security Challenges – Teil 2 by Günther...SBA Research
 
SBA Live Academy - CRLite – Revocation for X.509 certificates in the browser ...
SBA Live Academy - CRLite – Revocation for X.509 certificates in the browser ...SBA Live Academy - CRLite – Revocation for X.509 certificates in the browser ...
SBA Live Academy - CRLite – Revocation for X.509 certificates in the browser ...SBA Research
 
SBA Live Academy, Supply Chain & Cyber Security in einem Atemzug by Stefan Ja...
SBA Live Academy, Supply Chain & Cyber Security in einem Atemzug by Stefan Ja...SBA Live Academy, Supply Chain & Cyber Security in einem Atemzug by Stefan Ja...
SBA Live Academy, Supply Chain & Cyber Security in einem Atemzug by Stefan Ja...SBA Research
 
SBA Live Academy - Angriffe auf Windows Domains und Delegation by Reinhard Ku...
SBA Live Academy - Angriffe auf Windows Domains und Delegation by Reinhard Ku...SBA Live Academy - Angriffe auf Windows Domains und Delegation by Reinhard Ku...
SBA Live Academy - Angriffe auf Windows Domains und Delegation by Reinhard Ku...SBA Research
 
SBA Live Academy - Remote Access – Top Security Challenges, Part 1 - Günther ...
SBA Live Academy - Remote Access – Top Security Challenges, Part 1 - Günther ...SBA Live Academy - Remote Access – Top Security Challenges, Part 1 - Günther ...
SBA Live Academy - Remote Access – Top Security Challenges, Part 1 - Günther ...SBA Research
 

More from SBA Research (18)

SBA Live Academy, Rechtliche Risiken mit externen Mitarbeitern
SBA Live Academy, Rechtliche Risiken mit externen MitarbeiternSBA Live Academy, Rechtliche Risiken mit externen Mitarbeitern
SBA Live Academy, Rechtliche Risiken mit externen Mitarbeitern
 
SBA Live Academy, What the heck is secure computing
SBA Live Academy, What the heck is secure computingSBA Live Academy, What the heck is secure computing
SBA Live Academy, What the heck is secure computing
 
Tools & techniques, building a dev secops culture at mozilla sba live a...
Tools & techniques, building a dev secops culture at mozilla   sba live a...Tools & techniques, building a dev secops culture at mozilla   sba live a...
Tools & techniques, building a dev secops culture at mozilla sba live a...
 
SBA Live Academy - Secure Containers for Developer by Mathias Tausig
SBA Live Academy - Secure Containers for Developer by Mathias TausigSBA Live Academy - Secure Containers for Developer by Mathias Tausig
SBA Live Academy - Secure Containers for Developer by Mathias Tausig
 
SBA Live Academy - After the overflow: self-defense techniques (Linux Kernel)...
SBA Live Academy - After the overflow: self-defense techniques (Linux Kernel)...SBA Live Academy - After the overflow: self-defense techniques (Linux Kernel)...
SBA Live Academy - After the overflow: self-defense techniques (Linux Kernel)...
 
SBA Live Academy - Passwords: Policy and Storage with NIST SP800-63b by Jim M...
SBA Live Academy - Passwords: Policy and Storage with NIST SP800-63b by Jim M...SBA Live Academy - Passwords: Policy and Storage with NIST SP800-63b by Jim M...
SBA Live Academy - Passwords: Policy and Storage with NIST SP800-63b by Jim M...
 
SBA Live Academy - Threat Modeling 101 – eine kurze aber praxisnahe Einführun...
SBA Live Academy - Threat Modeling 101 – eine kurze aber praxisnahe Einführun...SBA Live Academy - Threat Modeling 101 – eine kurze aber praxisnahe Einführun...
SBA Live Academy - Threat Modeling 101 – eine kurze aber praxisnahe Einführun...
 
SBA Live Academy - Angriffe gegen das Stromnetz – Wenn der Strom nicht mehr a...
SBA Live Academy - Angriffe gegen das Stromnetz – Wenn der Strom nicht mehr a...SBA Live Academy - Angriffe gegen das Stromnetz – Wenn der Strom nicht mehr a...
SBA Live Academy - Angriffe gegen das Stromnetz – Wenn der Strom nicht mehr a...
 
SBA Live Academy - Physical Attacks against (I)IoT-Devices, Embedded Devices,...
SBA Live Academy - Physical Attacks against (I)IoT-Devices, Embedded Devices,...SBA Live Academy - Physical Attacks against (I)IoT-Devices, Embedded Devices,...
SBA Live Academy - Physical Attacks against (I)IoT-Devices, Embedded Devices,...
 
SBA Live Academy: Cyber Resilience - Failure is not an option by Simon Tjoa
SBA Live Academy: Cyber Resilience - Failure is not an option by Simon TjoaSBA Live Academy: Cyber Resilience - Failure is not an option by Simon Tjoa
SBA Live Academy: Cyber Resilience - Failure is not an option by Simon Tjoa
 
SBA Live Academy: Datenschutz Teil 1: Wozu Datenschutzgesetze? by Gerald Sendera
SBA Live Academy: Datenschutz Teil 1: Wozu Datenschutzgesetze? by Gerald SenderaSBA Live Academy: Datenschutz Teil 1: Wozu Datenschutzgesetze? by Gerald Sendera
SBA Live Academy: Datenschutz Teil 1: Wozu Datenschutzgesetze? by Gerald Sendera
 
SBA Live Academy: A Primer in Single Page Application Security by Thomas Konrad
SBA Live Academy: A Primer in Single Page Application Security by Thomas KonradSBA Live Academy: A Primer in Single Page Application Security by Thomas Konrad
SBA Live Academy: A Primer in Single Page Application Security by Thomas Konrad
 
SBA Live Academy: Software Security – Towards a Mature Lifecycle and DevSecOp...
SBA Live Academy: Software Security – Towards a Mature Lifecycle and DevSecOp...SBA Live Academy: Software Security – Towards a Mature Lifecycle and DevSecOp...
SBA Live Academy: Software Security – Towards a Mature Lifecycle and DevSecOp...
 
SBA Live Academy: Remote Access – Top Security Challenges – Teil 2 by Günther...
SBA Live Academy: Remote Access – Top Security Challenges – Teil 2 by Günther...SBA Live Academy: Remote Access – Top Security Challenges – Teil 2 by Günther...
SBA Live Academy: Remote Access – Top Security Challenges – Teil 2 by Günther...
 
SBA Live Academy - CRLite – Revocation for X.509 certificates in the browser ...
SBA Live Academy - CRLite – Revocation for X.509 certificates in the browser ...SBA Live Academy - CRLite – Revocation for X.509 certificates in the browser ...
SBA Live Academy - CRLite – Revocation for X.509 certificates in the browser ...
 
SBA Live Academy, Supply Chain & Cyber Security in einem Atemzug by Stefan Ja...
SBA Live Academy, Supply Chain & Cyber Security in einem Atemzug by Stefan Ja...SBA Live Academy, Supply Chain & Cyber Security in einem Atemzug by Stefan Ja...
SBA Live Academy, Supply Chain & Cyber Security in einem Atemzug by Stefan Ja...
 
SBA Live Academy - Angriffe auf Windows Domains und Delegation by Reinhard Ku...
SBA Live Academy - Angriffe auf Windows Domains und Delegation by Reinhard Ku...SBA Live Academy - Angriffe auf Windows Domains und Delegation by Reinhard Ku...
SBA Live Academy - Angriffe auf Windows Domains und Delegation by Reinhard Ku...
 
SBA Live Academy - Remote Access – Top Security Challenges, Part 1 - Günther ...
SBA Live Academy - Remote Access – Top Security Challenges, Part 1 - Günther ...SBA Live Academy - Remote Access – Top Security Challenges, Part 1 - Günther ...
SBA Live Academy - Remote Access – Top Security Challenges, Part 1 - Günther ...
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl