Ans | A | Title

1 | Y | What's the difference between a known-plaintext attack and a c...

0 | | Concatenating a one way function

2 | Y | Relative security of this polyalphabetic cipher system?

1 | | Are there Guaranteed Proof-of-work Systems?

0 | | One-Time MAC implementation's insufficient behavior

2 | | Can I generate same random number given same entropy value?

1 | | Grouping in BGN

5 | Y | Calculation-Intensive Decryption

0 | | Can anyone recommend a fast to encrypt, slow to decrypt, asymmetri...

0 | | XOR cipher of a public key and the same key signed with a one-way ...

0 | | what is a discrete logarithmic assumption? how does it set-up trus...

1 | | XOR Encryption with bcrypt password de-biasing

2 | Y | Is there a CSPRNG capable of generating a large sequence of number...

1 | Y | One time pad (OTP) perfect secrecy with different key space

3 | Y | Lightweight cipher using only 8-bit operations

3 | | Establish more secure symmetric crypto system given A and B have s...

1 | Y | What is the Peer Signing digest on an OpenSSL s_client connection?

1 | Y | Elliptic Curves and Small Message Space

0 | | Constraint Secret Sharing problem

1 | Y | Which symmetric encryption systems, pseudorandom number generators...

1 | Y | NIST vectors for RSA 4K Key

0 | | AES cache-timing attacks and nonce-based operation modes

1 | Y | Checking if discrete logarithm is $\geq\frac{\varphi(p)}2$ in poly...

0 | | Distribution of randomness in elliptic curve Diffie-Hellman shared...

0 | | Relation between k-th shortest vector of a lattice and (n-k+1)-th ...

1 | Y | Why do RSA public keys begin with 3048024100?

0 | | Can someone please design a hash function based scheme and solve t...

3 | Y | Do storage encryption systems care about size of data?

0 | | Does secure LWE implementation leak bit information?

3 | Y | FIPS 140-2 Compliant Algorithms

0 | | RIDDLE! - Frequency Crypto

0 | | Game save encryption

1 | Y | Is there any ECDSA Attack if I have millions of signatures?

1 | Y | Using multiple permutations to strengthen the security of a cipher

0 | | How to prove that a hash or an encrypted message was obtained from...

7 | Y | How much would it cost in U.S. dollars to brute force a 256 bit ke...

0 | | Which has a higher computational cost to brute force, mod 2 or mod...

0 | | A cipher scheme using symmetric and asymmetric cryptography, possi...

2 | Y | Homomorphic Encryption for Deep Learning

0 | | prove that the constructions are still PRF according to the defini...

1 | Y | How to generate safe primes in a verifiable way?

0 | | recreate X and Y from public key byte array using bounce castle

0 | | How many bits should I use for bearer tokens?

4 | Y | What are the requirements of a nonce?

0 | | Differential privacy of "randomized responses"

0 | | How does error distribution affect security in lattices?

4 | Y | Key derivation of public key without knowledge of private key

1 | Y | Role of long-term asymmetric keys in a forward secrecy instant mes...

1 | | CP-ABE for threshold cryptography

1 | | Key strenth in Cipher cascades (Veracrypt)

Back