• Home
  • News
  • Team
  • Projects
  • Blogs
  • Courses
  • Contact
  • Català
logo-no-background

Welcome to DISCRYPT, a dynamic research group from Universitat Autònoma de Barcelona dedicated to advancing knowledge in cybersecurity, cryptography, blockchain technologies, and data privacy.

  • 935813049
  • Edifici Q, Carrer de les Sitges, 08193 Barcelona
logo-with-shadow logo-with-shadow
  • Home
  • News
  • Team
  • Projects
  • Blogs
  • Courses
  • Contact
  • Català
  • Home
  • News
  • Team
  • Projects
  • Blogs
  • Courses
  • Contact
  • Català

Blogs

HomeBlogs
by Domènec Madrid Hernández
October 1, 2025
Blockchain Security, Privacy & Anonimity, Research, Security Alerts, Signature Schemes

Covert-Nonce Channel Attacks in Bitcoin Hardware Wallets

When we talk about self-custody and protecting our bitcoins, we understand that the seed used to generate our private keys must be completely isolated and stored securely. The best-known...
Read More
by Sergi Morales Duque
September 26, 2025
Cryptographic Primitives, Quantum Cryptography, Research, Security Alerts, Signature Schemes

Quantum threat on Bitcoin

Bitcoin and cryptocurrencies in general use cryptography to ensure the ownership of coins, among many other aspects. The security is based on “hard” problems that guarantee the basic properties,...
Read More
by Pol Espinasa i Vilarrasa
September 16, 2025
Bitcoin Core, Bitcoin-Cli, Layer 1, Nodes

How UTXO set can help us synchronize a Bitcoin node

Accelerating Bitcoin Initial Sync with the UTXO Set We’ve all experienced situations where our Bitcoin node stops working—maybe the Raspberry Pi crashes, the disk fails, or we simply need...
Read More
by David Corral Urbano
July 25, 2025
Docker & Deployment, Machine Learning, On-Chain Analytics, Privacy & Anonimity, Testnet/Mainnet Clone, Wallet Fingerprint, Wallets

Wallet fingerprinting in Bitcoin and its privacy implications

We are currently carrying out an in-depth study on wallet fingerprinting in Bitcoin, aiming to understand how different wallets — both software and hardware — shape transactions and what...
Read More
by Biel Castellarnau Ruiz
July 25, 2025
Replace By Fee, Transaction Security, Uncategorized, UTXO Management, Wallets, Zero-Confirmation

Replace By Fee

Transaction fees play a fundamental role in the proper functioning of the Bitcoin protocol. These fees act as an economic incentive for miners, who compete to create a block...
Read More
by Mario Amador Hurtado
July 23, 2025
Blockchain Security, Machine Learning, Malware

Class Imbalance in Bitcoin Illicit Activity Data

Introduction Detecting malicious activity in cryptocurrency networks like Bitcoin relies on datasets labeled with licit and illicit transactions. However, these datasets often suffer from class imbalance: the number of...
Read More
by Biel Castellarnau Ruiz
May 6, 2025
Blockchain Security, Cryptographic Primitives, Decoy Selection, Monero, Privacy & Anonimity, Research, Ring Signatures, RingCT

Ring Signatures in Monero

Introduction Ring Signatures Overview The main idea behind ring signatures is that a user $u$, who is part of a user group $$R = {\,u_1,\,u_2,\,\dots,\,u_i},$$ can sign a message...
Read More
by Domènec Madrid Hernández
April 25, 2025
Bitcoin Core, Docker & Deployment, Layer 1, Research, SegWit & Taproot from Genesis, Testnet/Mainnet Clone, Wallet Fingerprint

Building Your Own Mainnet

During my initial research period at UAB, I began developing a replica of the real Bitcoin mainnet. While this might sound unusual—especially given the existence of testnet and regtest...
Read More
by Chandrakumar Rajakumar
April 25, 2025
Decentralization, Layer 1, Mining Centralization, On-Chain Analytics, Research

Bitcoin’s Decentralization Dashboard

📊 Bitcoin’s Decentralization: What the Data Really Says Bitcoin is intended to be a decentralized, trustless peer-to-peer currency. But how decentralized is the network, really, 15 years after its creation? This...
Read More
by Oriol Roura Jiménez
April 21, 2025
Channel Security, Lightning Network, Research

Fixing Transactions with the Same Incoming and Outgoing Channel

The Lightning Network (LN) is a dynamic and constantly evolving second-layer scaling solution for Bitcoin, designed to enable fast, low-cost transactions. Recently, the network has introduced the “[ERR] HSWC:...
Read More

Posts pagination

1 2 Next

Recent Posts

  • Covert-Nonce Channel Attacks in Bitcoin Hardware Wallets
  • Quantum threat on Bitcoin
  • How UTXO set can help us synchronize a Bitcoin node
  • Wallet fingerprinting in Bitcoin and its privacy implications
  • Replace By Fee

Recent Comments

  1. satoshi on How UTXO set can help us synchronize a Bitcoin node
logo-no-background

Focused on the design, analysis, and implementation of cryptographic protocols and privacy-preserving technologies for decentralized systems.

  • Edifici Q, Carrer de les Sitges, 08193 Barcelona
  • 935813049

Sitemap

  • Home
  • News
  • Team
  • Projects
  • Blogs
  • Courses
  • Contact
  • Català

Blogs

September 16, 2025
How UTXO set can help us synchronize a Bitcoin node
July 25, 2025
Wallet fingerprinting in Bitcoin and its privacy implications
Copyright @ 2024. All Rights  Reserved by Unipix