Ans | A | Title

0 | | What Cryptography is that one?

1 | Y | Is it worth using custom encoding on top of standard encryption?

1 | Y | Relation between Key-exchange and Public-Key encryption schemes

2 | Y | What exactly is a quantum key distribution network for?

1 | | Semi static ElGamal vulnerability when the secret is not truely ra...

0 | | Compromising a CA, how is it achieved

0 | | Homogenous vs heterogeneous unbalanced Feistel networks?

0 | | CurveCP like protocol, but with secp256k1

3 | Y | Transferring Encrypted One-time pad over the internet

1 | | Is this is a secure use of AES-CTR?

1 | Y | how to efficiently prove the query result is empty?

0 | | Generating 1024 bits of entropy from a seed

1 | Y | Apple secure notes. How secure?

0 | | Searchable Symmetric Encryption VS Deterministic encryption?

3 | Y | RSA and prime difference

1 | Y | Why haven't any SHA-256 collisions been found yet?

1 | | How to break a columnar transposition cipher?

0 | | PGP key server shows my key as "*** KEY REVOKED *** [not veri...

1 | | Including the next random One Time Pad as part of the encoded mess...

1 | Y | Would a simplified CBC-MAC be safe?

0 | | Textbook RSA: Public key used to decrypt ciphertext and checked ag...

0 | | Use-cases for functional encryption (beginners)

0 | | 3DESede Decryption using java's cipher package

1 | Y | While encrypting what can happen between words

4 | Y | Security proofs for CBC mode

1 | Y | What are the implications of a non “constant time” implementat...

0 | | How can I compute the size in bits of group elements in charm-crypto?

1 | Y | SPA resistant RSA trace

0 | | What is the expected number of different sequences of bits in the ...

1 | Y | SHA256 and RIPEMD160 collisions

1 | Y | Decryption in Rabin

1 | Y | Affine Cipher Keys that map plaintext to a given ciphertext

0 | | Cracking a key using a combination of partial keys

1 | | Key Derivation Functions offering better than 2^hlen security?

1 | Y | Krack WPA2 decrypt only some small pieces of packets

7 | Y | Is Diffie-Hellman mathematically the same as RSA?

1 | Y | Shamir's scheme secret sharing

2 | Y | Which element produces randomness in symmetric block ciphers encry...

1 | Y | Double DES meet in the middle attack: number of candidate keys

0 | | What is “Fast Prime”?

1 | Y | Is OpenPGP used for purposes other than e-mail encryption and sign...

0 | | Implementing j48 training algorithm on ciphertext

0 | | Use of functions in Cryptographic Pairings: Optimal Ate

0 | | Conditional based Crypto based on Smart Contracts

0 | | Challenge and Response Size

1 | Y | Overview of relations between cryptographic primitives?

1 | Y | AES-GCM Encryption and Replay Attacks

4 | Y | Rehashing PBKDF2 hashes - do iterations stack?

2 | Y | RSA encryption and decryption not resulting to the correct result?

1 | Y | q-Strong Bilinear Diffie-Hellman

Back