Skip to main content

Explore our questions

1 vote
1 answer
20 views

Is it possible to perform a usefull weil descent against an elliptic curve defined over $F_q^2$?

4 votes
2 answers
146 views

Can wave-phase recurrence reveal structure in RNGs that pass all entropy tests?

0 votes
0 answers
63 views

Are qr codes secure from brute force?

0 votes
0 answers
33 views

How to break truncated linear conguential generator with partial information?

2 votes
1 answer
267 views

Why does differential cryptanalysis always start from the last round?

-1 votes
1 answer
52 views

Position of Nonce in Intermediate and Final Hash During Bitcoin Double SHA-256 and Its CNF Representation

2 votes
2 answers
71 views

What is the size of the keyspace of Kyber's private key and what is the duration needed to brute force it?

1 vote
1 answer
58 views

SipHash-1-3 128 bit variant

1 vote
1 answer
74 views

SIS with Hints, is it possible?

0 votes
0 answers
30 views

Implementation of DLP in characteristic 2

2 votes
1 answer
3k views

cracking a one time pad using key reuse

1 vote
1 answer
19k views

Finding a Caesar cipher key given encrypted message and part of decrypted message?

1 vote
1 answer
128 views

Does encrypting a billion short and similar jsons with known structure make encryption less secure?

1 vote
1 answer
93 views

How to break Mersenne Twister with non-consecutive 624 outputs if the gaps are known?

Browse more Questions