Search:  
Ans | A | Title
0 |   | What Cryptography is that one?
1 | Y | Is it worth using custom encoding on top of standard encryption?
1 | Y | Relation between Key-exchange and Public-Key encryption schemes
2 | Y | What exactly is a quantum key distribution network for?
1 |   | Semi static ElGamal vulnerability when the secret is not truely ra...
0 |   | Compromising a CA, how is it achieved
0 |   | Homogenous vs heterogeneous unbalanced Feistel networks?
0 |   | CurveCP like protocol, but with secp256k1
3 | Y | Transferring Encrypted One-time pad over the internet
1 |   | Is this is a secure use of AES-CTR?
1 | Y | how to efficiently prove the query result is empty?
0 |   | Generating 1024 bits of entropy from a seed
1 | Y | Apple secure notes. How secure?
0 |   | Searchable Symmetric Encryption VS Deterministic encryption?
3 | Y | RSA and prime difference
1 | Y | Why haven't any SHA-256 collisions been found yet?
1 |   | How to break a columnar transposition cipher?
0 |   | PGP key server shows my key as "*** KEY REVOKED *** [not veri...
1 |   | Including the next random One Time Pad as part of the encoded mess...
1 | Y | Would a simplified CBC-MAC be safe?
0 |   | Textbook RSA: Public key used to decrypt ciphertext and checked ag...
0 |   | Use-cases for functional encryption (beginners)
0 |   | 3DESede Decryption using java's cipher package
1 | Y | While encrypting what can happen between words
4 | Y | Security proofs for CBC mode
1 | Y | What are the implications of a non “constant time” implementat...
0 |   | How can I compute the size in bits of group elements in charm-crypto?
1 | Y | SPA resistant RSA trace
0 |   | What is the expected number of different sequences of bits in the ...
1 | Y | SHA256 and RIPEMD160 collisions
1 | Y | Decryption in Rabin
1 | Y | Affine Cipher Keys that map plaintext to a given ciphertext
0 |   | Cracking a key using a combination of partial keys
1 |   | Key Derivation Functions offering better than 2^hlen security?
1 | Y | Krack WPA2 decrypt only some small pieces of packets
7 | Y | Is Diffie-Hellman mathematically the same as RSA?
1 | Y | Shamir's scheme secret sharing
2 | Y | Which element produces randomness in symmetric block ciphers encry...
1 | Y | Double DES meet in the middle attack: number of candidate keys
0 |   | What is “Fast Prime”?
1 | Y | Is OpenPGP used for purposes other than e-mail encryption and sign...
0 |   | Implementing j48 training algorithm on ciphertext
0 |   | Use of functions in Cryptographic Pairings: Optimal Ate
0 |   | Conditional based Crypto based on Smart Contracts
0 |   | Challenge and Response Size
1 | Y | Overview of relations between cryptographic primitives?
1 | Y | AES-GCM Encryption and Replay Attacks
4 | Y | Rehashing PBKDF2 hashes - do iterations stack?
2 | Y | RSA encryption and decryption not resulting to the correct result?
1 | Y | q-Strong Bilinear Diffie-Hellman
Back