Search:  
Ans | A | Title
0 |   | Why it is not recommended to create your own random generator number?
0 |   | How would this be decrypted?
0 |   | Why is EAX not a generic composition ?
0 |   | Proof that a given function is not a OWF
0 |   | Incremental RC4 algorithm?
3 | Y | Is LUKS Anti-Forensic information splitter (AFsplit) indistinguish...
1 |   | Is there a way or how to predict the output size as a result of en...
2 |   | A RLWE promise problem
2 | Y | Multiple-prime RSA; how many primes can I use, for a 2048-bit modu...
1 |   | What is the intuition of canonical-embedding in homomorphic encryp...
2 | Y | Keys and mixed encoding - security implications
0 |   | Exponents for quantum-RSA
2 | Y | Encrypting messages for multiple recipients
3 | Y | Finding if two points on elliptic curve are related
0 |   | What is Royal Holloway Attack?
0 |   | Error when implementing encryption on Windows Server 2008
1 |   | Blowfish, Sboxes and the digits of PI, and the P_Array
2 | Y | Mixing algorithms for password hashing good or bad?
0 |   | One way................function question by reduction
0 |   | Anyone know what happened to encryptfree.com?
2 | Y | Different languages use-cases in information encryption?
2 | Y | Can we have single hash function both for data integrity and key d...
1 | Y | Can this AES encryption operation be described as being Homomorphi...
0 |   | Help assessing security of an ameteur encryption system
0 |   | A RLWE construction problem
1 | Y | How can we generate a shared key from two key pairs for an ECC imp...
2 | Y | How useful is proxy re-encryption if we end up needing a symmetric...
1 |   | MySQL/MariaDB AES_ENCRYPT() - ECB mode, IV, Padding Oracle Attack ...
1 | Y | Primitive polynomials and irreducible polynomials?
1 |   | Please help a complete noob with deniable encryption!
1 | Y | Is it known what input for sha256 would yield the same result as n...
2 |   | Choosing between RLWE-KEX methods.
1 |   | Doubtful validity of Microsoft Word digital signatures
0 |   | What is proactive secret sharing scheme?
0 |   | how to identify hashing algorithm from password and its resulted hash
1 | Y | Explain Fischlin's Fiat-Shamir like transformation
0 |   | $Q$ is the smallest number of valid pairs required to obtain colli...
1 | Y | Convert numeric value of RSA key to a .key file
2 | Y | Summarize the mathematical problem at the heart of breaking a Curv...
1 | Y | Is this a good way of splitting a private key into a 2 of 3 scheme?
0 |   | Generate ZMK using Clear components
0 |   | What if we use the uniform distribution in LWE?
1 | Y | Generating secure hash using iPhone Secure Enclave
0 |   | Modulo exponentiation invertibility
0 |   | Why can Ring-LWE hold security?
4 | Y | The difference between MACs vs. HMACs vs. PRFs
1 | Y | How to apply encryption on sensitive data exchange?
0 |   | Prove of identity by signature scheme
1 | Y | The parameters included in TLS 1.2 server signature in the ServerK...
0 |   | Why does Learning With Errors rely on Discrete Gaussian Distribution?
Back