Skip to main content

Explore our questions

29 votes
2 answers
26k views

Unpredictability of X.509 serial numbers

0 votes
0 answers
49 views

Is the following scheme in zero knowledge?

0 votes
1 answer
446 views

Constantly changing encryption for transferring data

5 votes
1 answer
175 views

How to Force a Hash Sequence $\{H(m,i)\}_{i}$ to "Behave Randomly?"

0 votes
2 answers
58 views

How to hash an already client-side hashed password again server-side?

-1 votes
1 answer
29 views

How to correctly convert Bitcoin’s double SHA-256 proof-of-work into a CNF satisfiability (SAT) problem?

0 votes
1 answer
115 views

Verifier running polynomial commitment

1 vote
1 answer
1k views

Input size recomendation of sequence for each test in NIST SP 800-22

0 votes
0 answers
24 views

Clarify whether a Beaver Triple is essentially a form of Functional Secret Sharing (FSS)?

2 votes
1 answer
414 views

Blowfish vs. Twofish regarding power consumption

1 vote
1 answer
63 views

What is the complexity of this attack Index calculus algorithm

1 vote
1 answer
48 views

Is the complexity of sieve algorithms for SVP really $2^{c n}$ for attacks on CKKS?

1 vote
1 answer
64 views

Permutations of Enigma Rotor Wiring

1 vote
0 answers
41 views

Security strength of DRBG

Browse more Questions