Search:  
Ans | A | Title
1 | Y | Why is it not possible to use a hashed password to log in?
0 |   | Linear Approximation Table of S-Box for SPN
1 |   | In what way is KeeLoq a block cipher?
0 |   | Cache Timing Attack SHA-3
0 |   | Quantum attack on multiple Diffie-Hellman key exchanges using same...
1 |   | Is it right that the Bomba can halt, but give you a different sett...
0 |   | PHP mt_rand() security
4 | Y | Finding length of a key for a given vigenere cipher using Index of...
0 |   | How can I calculate the entropy of an image?
0 |   | Is it possible to assume that the adversary is not allowed to make...
0 |   | How Shannon’s concept of perfect secrecy is linked with mutual i...
1 | Y | Pseudorandom Generator Behavior
1 | Y | Does this PBKDF2-SHA1 payload hint at a cryptographic security issue?
1 | Y | What is the difference between Argon2d and Argon2i?
1 | Y | Argon2i versus Argon2d?
0 |   | Challenge / Response to Prevent Replay Attack - Using nonce as cha...
0 |   | Where can I track the time/money it would take to break common enc...
1 | Y | What are the odds of collisions for a hash function with 256-bit o...
1 | Y | Is there a quick way to know the length of a message hashed using ...
0 |   | Polyalphabetic cipher
0 |   | What is the special property that an Abelian group must satisfy th...
1 | Y | Secure multiparty sum computation corruption bound
0 |   | Ture or false: using session keys via key establishment using a di...
1 | Y | What's the Ord(4) in $\mathbb{Z}^∗_{15}$?
1 | Y | What are the elements of the multiplicative group $\mathbb Z^{*}_{...
1 | Y | Security properties of an encryption scheme built from a PRP and a...
0 |   | Сryptanalysis of Hill's method
0 |   | How can I calculate non-linearity of an s-box element wise?
1 | Y | How does the ROCA attack work?
1 | Y | Discrete logarithm with unknown base
2 | Y | Can one claim that AES is a perfect cipher?
1 | Y | Avalanche effect in DES
0 |   | Recommendations for a book explaining most of the modern algorithms?
1 | Y | What does encryption with RSA public key provide?
1 | Y | Is it possible to actually verify a “sponge function” security...
8 | Y | Why is SSL on top of TCP?
2 | Y | Design properties of the Rijndael finite field?
2 | Y | Analysis of Repeatedly Enciphered Plaintext using Same Algorithm /...
1 | Y | Digital Signature Algorithm signature creation?
1 | Y | KeeLoq showing that decryption is indeed the inverse of encryption?
4 | Y | Properties of PRNG / Hashes?
3 | Y | Dictionary attack on pass-phrases on common algorithms?
0 |   | finding the relationship between the values
0 |   | Tweakable Even-Mansour scheme where the block size is twice the ke...
2 | Y | Purpose of hashing last block in Merkle-Damgård?
0 |   | Anti-spamming hash-based proof-of-work?
1 | Y | Risks of full length KCV (components and full keys)?
2 | Y | Discrete log accumulator without pairings?
0 |   | mnar Transposition Cipher and then One-Time-Pad cipher?
0 |   | Authentication over the phone?
Back