Skip to main content

Top Questions

1 vote
0 answers
17 views

What are the design-level constraints in TLS 1.3 for post-quantum adoption?

1 vote
0 answers
13 views

Performing scalar multiplication on secp256k1 using only the x-coordinate of a point

1 vote
1 answer
22 views

Is it possible to perform a usefull weil descent against an elliptic curve defined over $F_q^2$?

1 vote
1 answer
173 views

"Key agreement" versus "key exchange" versus "key establishment"

9 votes
2 answers
3k views

Why do encryption algorithms not consider the length of the message to be encrypted as sensitive information?

0 votes
0 answers
18 views

Difference between non-collusion and single-party corruption assumptions

4 votes
2 answers
148 views

Can wave-phase recurrence reveal structure in RNGs that pass all entropy tests?

2 votes
1 answer
63 views

A Question on Weil, Tate and other Pairings of Elliptic Curves

0 votes
1 answer
35 views

Biometrics + password scheme

4 votes
1 answer
73 views

Confused about converting Ed25519 public key to X25519 public key

0 votes
2 answers
57 views

Should we cut the key to length KMAC128 168 KMAC256 136

4 votes
1 answer
268 views

Practical implications of using HKDF as key combiner

1 vote
1 answer
67 views

Lwe with large error range

3 votes
1 answer
69 views

Banburismus and Bonus Scoring System

0 votes
0 answers
29 views

How to blind a Pedersen signature?

1 vote
1 answer
66 views

(How to Prevent) Provably Revealing Information about HMAC pre-image

2 votes
3 answers
387 views

Finding the public key of the domain owner in domain name certificates

1 vote
0 answers
36 views

Is SPHINCS+ viable for authenticating websites?

3 votes
2 answers
441 views

How can I make a Streaming Cipher Self-Synchronizing - and why?

0 votes
0 answers
46 views

DSA probability Evaluation

2 votes
0 answers
42 views

Recoverable ECDSA signature validation

0 votes
1 answer
23 views

DTLS 1.3 Record sequence number encryption

1 vote
1 answer
46 views

Hardware Reverse Engineering FPGA LUTs for AES Analysis

5 votes
1 answer
560 views

Why was the value of modulus (q) chosen small in KYBER and large in DILITHIUM?

7 votes
1 answer
1k views

Was the "higher cipher" that Robert Graves describes in his novel "I, Claudius" a real historical cipher, or was it his invention?

-1 votes
1 answer
113 views

Found collision in fnv132 hash

-1 votes
0 answers
30 views

I have managed to solve most of the parts but need to make sure if part d is done right [closed]

1 vote
0 answers
41 views

Is there a blind signature scheme that ensures the (user, message) pair can be only signed once

0 votes
1 answer
96 views

Would re-ordering encoded text be more secure?

6 votes
1 answer
59 views

Impossible optimization in IKE Intermediate RFC?

2 votes
1 answer
94 views
+50

Proving knowledge of message encrypted using Elgamal which is also committed in another "commitment"

3 votes
0 answers
39 views

NTT vs. Karatsuba for polynomial ring multiplication

6 votes
1 answer
106 views

How has WhatsApp addressed group member authenticity and forged acknowledgements since the 2018 "More is Less" paper?

2 votes
1 answer
68 views

About obfuscating re-encryption: the first construction is not a obfuscator

5 votes
1 answer
567 views

Where *not* to use the ROM

1 vote
1 answer
115 views

Lattice attack against single signature : how to modify the b1 and c1 constants in order to get the script working against smaller leaks?

0 votes
0 answers
63 views

Are qr codes secure from brute force?

1 vote
1 answer
72 views

Proving that one discrete logarithm is the square or inverse of another one

1 vote
1 answer
106 views

For AES-GCM, why do protocols not use the nonce to prevent replay attacks?

2 votes
0 answers
50 views

Change KYBER KEM parameters

1 vote
1 answer
53 views

Is it obvious that if Enigma Ring settings are displayed in the Indicator Windows, the Enigma will encode identically up until a turnover?

0 votes
0 answers
55 views

Master-slave encryption/decryption keys

1 vote
1 answer
138 views

How to complete security definition

1 vote
1 answer
162 views

Gathering entropy at different times using a cycle counter

2 votes
1 answer
92 views

Amicable Pairs and Koblitz curve

3 votes
3 answers
954 views

Does the padding have to be invertible for MAC security?

1 vote
1 answer
53 views

Cost of TLS (1.3) Handshake using RSA compared to cost of using ECC?

3 votes
1 answer
349 views

Is it possible to find an elliptic curve of specific order such that the order is greater than the prime number used to construct it?


Looking for more? Browse the complete list of questions, or popular tags. Help us answer unanswered questions.