Skip to main content

Top Questions

0 votes
0 answers
3 views

Is traditional cryptography still being developed?

1 vote
1 answer
212 views

How can I compute the theoretical total key-space for 521 bit elliptic curve ECDH private keys?

1 vote
0 answers
17 views

What are the design-level constraints in TLS 1.3 for post-quantum adoption?

1 vote
1 answer
195 views

Is text description of MD2 algorithm wrong?

1 vote
1 answer
418 views

Key establishment protocols other than Diffie-Hellman

2 votes
1 answer
94 views
+50

Proving knowledge of message encrypted using Elgamal which is also committed in another "commitment"

1 vote
0 answers
13 views

Performing scalar multiplication on secp256k1 using only the x-coordinate of a point

0 votes
2 answers
57 views

Should we cut the key to length KMAC128 168 KMAC256 136

1 vote
1 answer
21 views

Is it possible to perform a usefull weil descent against an elliptic curve defined over $F_q^2$?

1 vote
1 answer
1k views

Obtain Enigma key having a encrypted text and the plain text

0 votes
0 answers
18 views

Difference between non-collusion and single-party corruption assumptions

1 vote
1 answer
172 views

"Key agreement" versus "key exchange" versus "key establishment"

4 votes
2 answers
148 views

Can wave-phase recurrence reveal structure in RNGs that pass all entropy tests?

3 votes
2 answers
3k views

Where is my private key stored when I communicate to a website that uses SSL/TLS?

2 votes
1 answer
62 views

A Question on Weil, Tate and other Pairings of Elliptic Curves

0 votes
1 answer
34 views

Biometrics + password scheme

6 votes
1 answer
106 views

How has WhatsApp addressed group member authenticity and forged acknowledgements since the 2018 "More is Less" paper?

3 votes
1 answer
69 views

Banburismus and Bonus Scoring System

9 votes
2 answers
3k views

Why do encryption algorithms not consider the length of the message to be encrypted as sensitive information?

4 votes
1 answer
73 views

Confused about converting Ed25519 public key to X25519 public key

2 votes
2 answers
707 views

Is this modification in Merkle-Damgård collision-resistant?

0 votes
1 answer
35 views

Camellia ECB-mode chosen key for desired ciphertext/plaintext pair

0 votes
0 answers
29 views

How to blind a Pedersen signature?

1 vote
1 answer
67 views

Lwe with large error range

1 vote
1 answer
66 views

(How to Prevent) Provably Revealing Information about HMAC pre-image

1 vote
0 answers
36 views

Is SPHINCS+ viable for authenticating websites?

4 votes
1 answer
268 views

Practical implications of using HKDF as key combiner

0 votes
0 answers
46 views

DSA probability Evaluation

4 votes
3 answers
162 views

Why are the indicator drums of a Bombe machine labelled from A to Z clockwise?

2 votes
0 answers
42 views

Recoverable ECDSA signature validation

0 votes
1 answer
23 views

DTLS 1.3 Record sequence number encryption

2 votes
3 answers
408 views

Is a long Enigma message vulnerable to the index of coincidence?

0 votes
1 answer
55 views

Multi-Party computation or Secret Sharing libraries in Rust or NodeJS?

6 votes
1 answer
59 views

Impossible optimization in IKE Intermediate RFC?

2 votes
0 answers
98 views

Has anyone used Arkworks with Spartan?

2 votes
3 answers
387 views

Finding the public key of the domain owner in domain name certificates

1 vote
1 answer
46 views

Hardware Reverse Engineering FPGA LUTs for AES Analysis

1 vote
1 answer
142 views

Is it possible to homomorphically evaluate an encryption circuit?

-1 votes
0 answers
30 views

I have managed to solve most of the parts but need to make sure if part d is done right [closed]

2 votes
1 answer
312 views

Homomorphic encryption key switching

3 votes
2 answers
441 views

How can I make a Streaming Cipher Self-Synchronizing - and why?

2 votes
1 answer
166 views

What's the difference between these two attacks?(Lim Lee and Sub group) I am a beginner can someone explain in detail?

17 votes
6 answers
53k views

Creating your own encryption and decryption algorithm

0 votes
1 answer
102 views

How IKE authentication happens? what's the role of HASH_I & HASH_R, and how it gets verified by each parties? and where SKEYID_a gets engaged?

1 vote
0 answers
41 views

Is there a blind signature scheme that ensures the (user, message) pair can be only signed once

3 votes
0 answers
39 views

NTT vs. Karatsuba for polynomial ring multiplication

5 votes
0 answers
129 views

Small(er)-lane Keccak-f: impact and usage

1 vote
1 answer
106 views

The representation of truncation protocol in SecureML


Looking for more? Browse the complete list of questions, or popular tags. Help us answer unanswered questions.