Ans | A | Title

1 | Y | Why is it not possible to use a hashed password to log in?

0 | | Linear Approximation Table of S-Box for SPN

1 | | In what way is KeeLoq a block cipher?

0 | | Cache Timing Attack SHA-3

0 | | Quantum attack on multiple Diffie-Hellman key exchanges using same...

1 | | Is it right that the Bomba can halt, but give you a different sett...

0 | | PHP mt_rand() security

4 | Y | Finding length of a key for a given vigenere cipher using Index of...

0 | | How can I calculate the entropy of an image?

0 | | Is it possible to assume that the adversary is not allowed to make...

0 | | How Shannon’s concept of perfect secrecy is linked with mutual i...

1 | Y | Pseudorandom Generator Behavior

1 | Y | Does this PBKDF2-SHA1 payload hint at a cryptographic security issue?

1 | Y | What is the difference between Argon2d and Argon2i?

1 | Y | Argon2i versus Argon2d?

0 | | Challenge / Response to Prevent Replay Attack - Using nonce as cha...

0 | | Where can I track the time/money it would take to break common enc...

1 | Y | What are the odds of collisions for a hash function with 256-bit o...

1 | Y | Is there a quick way to know the length of a message hashed using ...

0 | | Polyalphabetic cipher

0 | | What is the special property that an Abelian group must satisfy th...

1 | Y | Secure multiparty sum computation corruption bound

0 | | Ture or false: using session keys via key establishment using a di...

1 | Y | What's the Ord(4) in $\mathbb{Z}^∗_{15}$?

1 | Y | What are the elements of the multiplicative group $\mathbb Z^{*}_{...

1 | Y | Security properties of an encryption scheme built from a PRP and a...

0 | | Сryptanalysis of Hill's method

0 | | How can I calculate non-linearity of an s-box element wise?

1 | Y | How does the ROCA attack work?

1 | Y | Discrete logarithm with unknown base

2 | Y | Can one claim that AES is a perfect cipher?

1 | Y | Avalanche effect in DES

0 | | Recommendations for a book explaining most of the modern algorithms?

1 | Y | What does encryption with RSA public key provide?

1 | Y | Is it possible to actually verify a “sponge function” security...

8 | Y | Why is SSL on top of TCP?

2 | Y | Design properties of the Rijndael finite field?

2 | Y | Analysis of Repeatedly Enciphered Plaintext using Same Algorithm /...

1 | Y | Digital Signature Algorithm signature creation?

1 | Y | KeeLoq showing that decryption is indeed the inverse of encryption?

4 | Y | Properties of PRNG / Hashes?

3 | Y | Dictionary attack on pass-phrases on common algorithms?

0 | | finding the relationship between the values

0 | | Tweakable Even-Mansour scheme where the block size is twice the ke...

2 | Y | Purpose of hashing last block in Merkle-Damgård?

0 | | Anti-spamming hash-based proof-of-work?

1 | Y | Risks of full length KCV (components and full keys)?

2 | Y | Discrete log accumulator without pairings?

0 | | mnar Transposition Cipher and then One-Time-Pad cipher?

0 | | Authentication over the phone?

Back