Skip to main content

Explore our questions

2 votes
1 answer
90 views
+50

Proving knowledge of message encrypted using Elgamal which is also committed in another "commitment"

0 votes
2 answers
54 views

Should we cut the key to length KMAC128 168 KMAC256 136

1 vote
1 answer
16 views

Is it possible to perform a usefull weil descent against an elliptic curve defined over $F_q^2$?

1 vote
1 answer
1k views

Obtain Enigma key having a encrypted text and the plain text

0 votes
1 answer
409 views

Key establishment protocols other than Diffie-Hellman

0 votes
0 answers
15 views

Difference between non-collusion and single-party corruption assumptions

1 vote
1 answer
164 views

"Key agreement" versus "key exchange" versus "key establishment"

4 votes
2 answers
143 views

Can wave-phase recurrence reveal structure in RNGs that pass all entropy tests?

3 votes
2 answers
3k views

Where is my private key stored when I communicate to a website that uses SSL/TLS?

2 votes
1 answer
59 views

A Question on Weil, Tate and other Pairings of Elliptic Curves

0 votes
1 answer
31 views

Biometrics + password scheme

6 votes
1 answer
106 views

How has WhatsApp addressed group member authenticity and forged acknowledgements since the 2018 "More is Less" paper?

3 votes
1 answer
67 views

Banburismus and Bonus Scoring System

9 votes
2 answers
3k views

Why do encryption algorithms not consider the length of the message to be encrypted as sensitive information?

Browse more Questions