Skip to main content

Explore our questions

1 vote
1 answer
205 views

How can I compute the theoretical total key-space for 521 bit elliptic curve ECDH private keys?

0 votes
0 answers
9 views

What are the design-level constraints in TLS 1.3 for post-quantum adoption?

1 vote
1 answer
187 views

Is text description of MD2 algorithm wrong?

1 vote
1 answer
417 views

Key establishment protocols other than Diffie-Hellman

2 votes
1 answer
92 views
+50

Proving knowledge of message encrypted using Elgamal which is also committed in another "commitment"

1 vote
0 answers
11 views

Performing scalar multiplication on secp256k1 using only the x-coordinate of a point

0 votes
2 answers
55 views

Should we cut the key to length KMAC128 168 KMAC256 136

1 vote
1 answer
20 views

Is it possible to perform a usefull weil descent against an elliptic curve defined over $F_q^2$?

1 vote
1 answer
1k views

Obtain Enigma key having a encrypted text and the plain text

0 votes
0 answers
18 views

Difference between non-collusion and single-party corruption assumptions

1 vote
1 answer
172 views

"Key agreement" versus "key exchange" versus "key establishment"

4 votes
2 answers
146 views

Can wave-phase recurrence reveal structure in RNGs that pass all entropy tests?

3 votes
2 answers
3k views

Where is my private key stored when I communicate to a website that uses SSL/TLS?

2 votes
1 answer
62 views

A Question on Weil, Tate and other Pairings of Elliptic Curves

Browse more Questions