Skip to main content

Explore our questions

0 votes
1 answer
35 views

Camellia ECB-mode chosen key for desired ciphertext/plaintext pair

0 votes
2 answers
78 views

Reverse-engineering SQLite encryption: raw key known, but unable to extract decrypted DB

1 vote
3 answers
282 views

Insecure variants of Even-Mansour

0 votes
0 answers
72 views

Good key schedules for block ciphers

2 votes
1 answer
108 views

Tweakable block cipher & XTS for FDE?

0 votes
1 answer
54 views

GCM AES over (wireless) internet - why reset counter with every packet?

1 vote
0 answers
27 views

Deriving subkeys for a mode of operation

3 votes
2 answers
800 views

Cracking a key using a combination of partial keys

2 votes
0 answers
128 views

Bit based division property

4 votes
1 answer
126 views

What was the motivation for the Serpent linear function?

1 vote
1 answer
72 views

Prefix Free secure PRF Security strength

1 vote
1 answer
70 views

Key-defined iterated round function. Let the key be the cipher

2 votes
1 answer
749 views

For block ciphers, does a key and input of all zeros lead to a specific collision?

1 vote
1 answer
98 views

Speck vs Threefish's Mix

Browse more Questions