Search:  
Ans | A | Title
1 |   | compact rsa private key format
1 | Y | ECDSA private key format
0 |   | Is deterministic encryption appropriate for low entropy plaintext ...
3 | Y | Simple example to describe Bilinear mapping
1 |   | Traitor tracing - codeword properties
1 | Y | Elliptic curves with pairings at 128-bit security in libpbc?
1 | Y | Shamir secret sharing with two types of parties
0 |   | RSA common protocol failure exam preparation
1 | Y | If p mod 4 = 3, does choosing a=1 in the parameters of EdDSA reall...
2 | Y | Fixed point of the SHA-256 compression function
0 |   | Faster alternatives to PBC's element_from_hash?
2 | Y | zero knowledge proof application
1 |   | XOR Encryption with bcrypt password de-biasing
2 | Y | How does ECC go from decimals to integers?
2 | Y | Is there a way of increasing the time to brute force a cipher, but...
0 |   | Is ECDH(E) Key Exchange FIPS 140-2 compliant?
1 | Y | Indeterminate Message Validity as a Noise Source in High Volume Ch...
0 |   | What is the easiest way to work with ed25519 in sage or pari/gp
0 |   | How to decode this one?
1 | Y | Computing Logarithm using homomorphic encryption
0 |   | Is there a one-way key for data depersonalization?
3 | Y | How long would it take to brute force an AES-128 key?
0 |   | For encryption with a passphrase, should you re-use the same salt ...
0 |   | Conversion of an simple interactive protocol to Sigma protocol
1 |   | Should AES-CMAC key cryptoperiod be affected by MAC truncation to ...
2 | Y | What is the purpose of the middle-man actor in chaffing and winnow...
1 | Y | Does the exact distribution of padding bytes in PKCSv1.5 type 1 ma...
1 | Y | Fully Homomorphic Encryption: Going from an integer to bits
2 | Y | Is a 1024-bit DSA key considered safe?
2 | Y | How does the ring settings of enigma change wiring tables?
1 | Y | Practical solution to store a highly valuable message: what am I m...
1 | Y | Are pairings still the most efficient implementation for identity ...
2 | Y | How much faster in symmetric cryptography compared to asymmetric c...
1 |   | Different ways for modular exponentiation $A^E$ with negative A's
1 | Y | Why is padding used in CBC mode?
2 | Y | Extracting randomness from highly-biased RNG
1 | Y | How to find breaking complexity of N bit sequence?
2 |   | AES CBC mode is good for encrypting 15-20mb files and then sending...
0 |   | Online platform: best way to only let the user access their own data?
1 | Y | Does still make sense to use SHA1?
1 | Y | How is OID 2a 86 48 86 f7 0d parsed as 1.2.840.113549?
2 | Y | Is there a standard one way function that does not produce collision
1 |   | CP-ABE for threshold cryptography
1 | Y | Elliptic curve and embedding degree
2 | Y | What's the difference between polylogarithmic and logarithmic?
2 | Y | How safe is XOR with multiple independent but non random keys?
1 |   | Create composite group for pairing in JPBC
0 |   | AES CBC with unique key per message, but fixed IV
1 | Y | How does DPA work on AES?
1 |   | Does High Frequency Randomisation of valid and dummy messages in a...
Back