Ans | A | Title

0 | | Why it is not recommended to create your own random generator number?

0 | | How would this be decrypted?

0 | | Why is EAX not a generic composition ?

0 | | Proof that a given function is not a OWF

0 | | Incremental RC4 algorithm?

3 | Y | Is LUKS Anti-Forensic information splitter (AFsplit) indistinguish...

1 | | Is there a way or how to predict the output size as a result of en...

2 | | A RLWE promise problem

2 | Y | Multiple-prime RSA; how many primes can I use, for a 2048-bit modu...

1 | | What is the intuition of canonical-embedding in homomorphic encryp...

2 | Y | Keys and mixed encoding - security implications

0 | | Exponents for quantum-RSA

2 | Y | Encrypting messages for multiple recipients

3 | Y | Finding if two points on elliptic curve are related

0 | | What is Royal Holloway Attack?

0 | | Error when implementing encryption on Windows Server 2008

1 | | Blowfish, Sboxes and the digits of PI, and the P_Array

2 | Y | Mixing algorithms for password hashing good or bad?

0 | | One way................function question by reduction

0 | | Anyone know what happened to encryptfree.com?

2 | Y | Different languages use-cases in information encryption?

2 | Y | Can we have single hash function both for data integrity and key d...

1 | Y | Can this AES encryption operation be described as being Homomorphi...

0 | | Help assessing security of an ameteur encryption system

0 | | A RLWE construction problem

1 | Y | How can we generate a shared key from two key pairs for an ECC imp...

2 | Y | How useful is proxy re-encryption if we end up needing a symmetric...

1 | | MySQL/MariaDB AES_ENCRYPT() - ECB mode, IV, Padding Oracle Attack ...

1 | Y | Primitive polynomials and irreducible polynomials?

1 | | Please help a complete noob with deniable encryption!

1 | Y | Is it known what input for sha256 would yield the same result as n...

2 | | Choosing between RLWE-KEX methods.

1 | | Doubtful validity of Microsoft Word digital signatures

0 | | What is proactive secret sharing scheme?

0 | | how to identify hashing algorithm from password and its resulted hash

1 | Y | Explain Fischlin's Fiat-Shamir like transformation

0 | | $Q$ is the smallest number of valid pairs required to obtain colli...

1 | Y | Convert numeric value of RSA key to a .key file

2 | Y | Summarize the mathematical problem at the heart of breaking a Curv...

1 | Y | Is this a good way of splitting a private key into a 2 of 3 scheme?

0 | | Generate ZMK using Clear components

0 | | What if we use the uniform distribution in LWE?

1 | Y | Generating secure hash using iPhone Secure Enclave

0 | | Modulo exponentiation invertibility

0 | | Why can Ring-LWE hold security?

4 | Y | The difference between MACs vs. HMACs vs. PRFs

1 | Y | How to apply encryption on sensitive data exchange?

0 | | Prove of identity by signature scheme

1 | Y | The parameters included in TLS 1.2 server signature in the ServerK...

0 | | Why does Learning With Errors rely on Discrete Gaussian Distribution?

Back