Ans | A | Title

1 | | compact rsa private key format

1 | Y | ECDSA private key format

0 | | Is deterministic encryption appropriate for low entropy plaintext ...

3 | Y | Simple example to describe Bilinear mapping

1 | | Traitor tracing - codeword properties

1 | Y | Elliptic curves with pairings at 128-bit security in libpbc?

1 | Y | Shamir secret sharing with two types of parties

0 | | RSA common protocol failure exam preparation

1 | Y | If p mod 4 = 3, does choosing a=1 in the parameters of EdDSA reall...

2 | Y | Fixed point of the SHA-256 compression function

0 | | Faster alternatives to PBC's element_from_hash?

2 | Y | zero knowledge proof application

1 | | XOR Encryption with bcrypt password de-biasing

2 | Y | How does ECC go from decimals to integers?

2 | Y | Is there a way of increasing the time to brute force a cipher, but...

0 | | Is ECDH(E) Key Exchange FIPS 140-2 compliant?

1 | Y | Indeterminate Message Validity as a Noise Source in High Volume Ch...

0 | | What is the easiest way to work with ed25519 in sage or pari/gp

0 | | How to decode this one?

1 | Y | Computing Logarithm using homomorphic encryption

0 | | Is there a one-way key for data depersonalization?

3 | Y | How long would it take to brute force an AES-128 key?

0 | | For encryption with a passphrase, should you re-use the same salt ...

0 | | Conversion of an simple interactive protocol to Sigma protocol

1 | | Should AES-CMAC key cryptoperiod be affected by MAC truncation to ...

2 | Y | What is the purpose of the middle-man actor in chaffing and winnow...

1 | Y | Does the exact distribution of padding bytes in PKCSv1.5 type 1 ma...

1 | Y | Fully Homomorphic Encryption: Going from an integer to bits

2 | Y | Is a 1024-bit DSA key considered safe?

2 | Y | How does the ring settings of enigma change wiring tables?

1 | Y | Practical solution to store a highly valuable message: what am I m...

1 | Y | Are pairings still the most efficient implementation for identity ...

2 | Y | How much faster in symmetric cryptography compared to asymmetric c...

1 | | Different ways for modular exponentiation $A^E$ with negative A's

1 | Y | Why is padding used in CBC mode?

2 | Y | Extracting randomness from highly-biased RNG

1 | Y | How to find breaking complexity of N bit sequence?

2 | | AES CBC mode is good for encrypting 15-20mb files and then sending...

0 | | Online platform: best way to only let the user access their own data?

1 | Y | Does still make sense to use SHA1?

1 | Y | How is OID 2a 86 48 86 f7 0d parsed as 1.2.840.113549?

2 | Y | Is there a standard one way function that does not produce collision

1 | | CP-ABE for threshold cryptography

1 | Y | Elliptic curve and embedding degree

2 | Y | What's the difference between polylogarithmic and logarithmic?

2 | Y | How safe is XOR with multiple independent but non random keys?

1 | | Create composite group for pairing in JPBC

0 | | AES CBC with unique key per message, but fixed IV

1 | Y | How does DPA work on AES?

1 | | Does High Frequency Randomisation of valid and dummy messages in a...

Back