Newest Questions
579 questions
0
votes
0
answers
8
views
I'm sure this large-alphabet polyalphabetical cipher is semantically secure
Okay, so we know OTP is not something practically used. But what about a polyalphabetical cipher where alphabet is astronomically large?
Say we generate "letters" by starting at arbitrary ...
1
vote
0
answers
27
views
Visualization bug when hovering over MathJax / cases
I'm getting a weird issue when I hover my mouse pointer over MathJax / Latex with "cases":
...
1
vote
0
answers
8
views
2024: a year in moderation
It’s that time of the year again! As we bid farewell to the year that's concluded and welcome the new one, we have a tradition of sharing moderation stats for the preceding calendar year.
As most of ...
1
vote
1
answer
36
views
How can I improve this qu to get it reopened?
How secure is matrix multiplication when used as general purpose irreversible hashing?
I spent quite a bit of time making this question, coming up with a proof of concept and formatting it for ...
0
votes
1
answer
90
views
Advertising Test Beginning Nov 13 2024
We’ve been exploring the concept of using open auction to manage advertising on some Stack Exchange sites. Under this model, advertisers (who have been organized into categories based on their ...
1
vote
1
answer
80
views
Are requirement analysis on-topic here?
As we know, cryptanalysis questions are off-topic here - there's little value of a single decrypted plaintext to the larger community. (This excludes general cryptanalysis technique questions of ...
1
vote
1
answer
48
views
The Side Channel automatically frozen for inactivity
Now, our side-channel has been frozen
This room has been automatically frozen for inactivity
We need to unlock it!
3
votes
3
answers
53
views
Two rival tags, [tpm] and [trusted-platform-module], both for the same topic. Neither is officially a synonym for the other
This is the description for the [tpm] tag:
A Trusted Platform Module (TPM) is a secure co-processor found in some PC-type computers that provides cryptographic operations and system integrity ...
2
votes
1
answer
108
views
Google Chrome displays formulas in Latex wrongly on stackexchange, why?
Some formulas in Latex are displayed as boxes like here:
Link to the answer depicted above.
I don't have this problem with Firefox or Safari. I also tried to turn off my extensions. Do you know why ...
1
vote
0
answers
13
views
Tag usage clarification discussion for [programming-interface]
I recently edited a question, and changed the [cryptoapi] tag to [programming-interface]. An awkward situation is that, the usage of [cryptoapi] is specific but narrow; and [programming-interface] tag ...
3
votes
2
answers
86
views
I'm seeking advice on announcing another vulnerability. How should I proceed?
We know that the vulnerability in RSA encryption arises when the difference between the two prime numbers is too small. For RSA, the attacker targets factorizing $n=p\times q$. If the difference $p−q&...
2
votes
1
answer
41
views
Please delete the tags [de] and [s]
I was tagging some question, and my IME was in the state for entering Chinese, and I mistyped these letters.
At the same time, it seems [cryptographic] and [chess] are irrelevant for us, delete them ...
2
votes
1
answer
49
views
Tactics (tricks) for asking questions
In one of my previous comments made in a Q that got too lengthy, I mentioned that I use some tactics when asking, in an attempt to get the most relevant amswers.
I'd like to share the details with the ...
7
votes
0
answers
98
views
2024 Community Moderator Election Results
Moderator election #6 on Cryptography has come to a close, the votes have been tallied, and the new moderator is:
They will be joining the existing crew shortly — please thank them for volunteering ...
2
votes
1
answer
18
views
Asking for known schemes
I'd like to know if it's ok to ask help in identifying schemes adapting to specified conditions.
Example:
Is there a cryptographic scheme that allows encrypted data meeting conditions A, B, C, to be ...