Skip to main content

Explore our questions

0 votes
1 answer
35 views

Biometrics + password scheme

9 votes
2 answers
3k views

Why do encryption algorithms not consider the length of the message to be encrypted as sensitive information?

2 votes
3 answers
387 views

Finding the public key of the domain owner in domain name certificates

2 votes
1 answer
312 views

Homomorphic encryption key switching

17 votes
6 answers
53k views

Creating your own encryption and decryption algorithm

1 vote
1 answer
134 views

Ensuring Data Security During Decryption and Re-encryption Process

0 votes
1 answer
96 views

Would re-ordering encoded text be more secure?

2 votes
1 answer
210 views

Prove with ZKP that I have encrypted a message $v + random\_number\cdot c$ given an RSA public key?

1 vote
1 answer
269 views

How could unbreakable encryption be used?

1 vote
1 answer
82 views

Can I get individual data by paillier decryption if we send aggregated encrypted data?

0 votes
2 answers
78 views

Reverse-engineering SQLite encryption: raw key known, but unable to extract decrypted DB

2 votes
0 answers
34 views

Is creating my own WebCrypto container format responsible for a beta‐stage web app?

1 vote
1 answer
71 views

Is it secure to store only the aggregated BLS public key in a smart contract for signature verification?

1 vote
1 answer
138 views

How to complete security definition

Browse more Questions