Search:  
Ans | A | Title
1 | Y | What's the difference between a known-plaintext attack and a c...
0 |   | Concatenating a one way function
2 | Y | Relative security of this polyalphabetic cipher system?
1 |   | Are there Guaranteed Proof-of-work Systems?
0 |   | One-Time MAC implementation's insufficient behavior
2 |   | Can I generate same random number given same entropy value?
1 |   | Grouping in BGN
5 | Y | Calculation-Intensive Decryption
0 |   | Can anyone recommend a fast to encrypt, slow to decrypt, asymmetri...
0 |   | XOR cipher of a public key and the same key signed with a one-way ...
0 |   | what is a discrete logarithmic assumption? how does it set-up trus...
1 |   | XOR Encryption with bcrypt password de-biasing
2 | Y | Is there a CSPRNG capable of generating a large sequence of number...
1 | Y | One time pad (OTP) perfect secrecy with different key space
3 | Y | Lightweight cipher using only 8-bit operations
3 |   | Establish more secure symmetric crypto system given A and B have s...
1 | Y | What is the Peer Signing digest on an OpenSSL s_client connection?
1 | Y | Elliptic Curves and Small Message Space
0 |   | Constraint Secret Sharing problem
1 | Y | Which symmetric encryption systems, pseudorandom number generators...
1 | Y | NIST vectors for RSA 4K Key
0 |   | AES cache-timing attacks and nonce-based operation modes
1 | Y | Checking if discrete logarithm is $\geq\frac{\varphi(p)}2$ in poly...
0 |   | Distribution of randomness in elliptic curve Diffie-Hellman shared...
0 |   | Relation between k-th shortest vector of a lattice and (n-k+1)-th ...
1 | Y | Why do RSA public keys begin with 3048024100?
0 |   | Can someone please design a hash function based scheme and solve t...
3 | Y | Do storage encryption systems care about size of data?
0 |   | Does secure LWE implementation leak bit information?
3 | Y | FIPS 140-2 Compliant Algorithms
0 |   | RIDDLE! - Frequency Crypto
0 |   | Game save encryption
1 | Y | Is there any ECDSA Attack if I have millions of signatures?
1 | Y | Using multiple permutations to strengthen the security of a cipher
0 |   | How to prove that a hash or an encrypted message was obtained from...
7 | Y | How much would it cost in U.S. dollars to brute force a 256 bit ke...
0 |   | Which has a higher computational cost to brute force, mod 2 or mod...
0 |   | A cipher scheme using symmetric and asymmetric cryptography, possi...
2 | Y | Homomorphic Encryption for Deep Learning
0 |   | prove that the constructions are still PRF according to the defini...
1 | Y | How to generate safe primes in a verifiable way?
0 |   | recreate X and Y from public key byte array using bounce castle
0 |   | How many bits should I use for bearer tokens?
4 | Y | What are the requirements of a nonce?
0 |   | Differential privacy of "randomized responses"
0 |   | How does error distribution affect security in lattices?
4 | Y | Key derivation of public key without knowledge of private key
1 | Y | Role of long-term asymmetric keys in a forward secrecy instant mes...
1 |   | CP-ABE for threshold cryptography
1 |   | Key strenth in Cipher cascades (Veracrypt)
Back