Skip to main content

Questions tagged [algorithm-design]

Design of cryptographic primitives (algorithms), like block ciphers, stream ciphers, random-number generators, hash functions, MACs, key exchanges, public-key encryption or signature schemes. Also tag with the relevant type of primitive. If you ask about a known existing algorithm, also tag with its name.

1 vote
2 answers
160 views

Note: ECC = Error Correcting Code(s) Is it possible to have a codeword from an ECC be indistinguishable from random? If there is a shared secret between the sender and receiver then it's not a ...
Josh Anuvinovich's user avatar
0 votes
0 answers
63 views

Consider the following construction based on an exact quadratic gap between two primes. Let 𝑝 be a public prime. A valid private structure consists of: • a prime 𝑞 such that 𝑞 > 𝑝; • a ...
junior ns's user avatar
4 votes
1 answer
382 views

Lattice-based schemes sometimes base their difficulty on the intractability of finding short solutions in under-determined linear systems. This assumes of course the underlying ring element is not bit-...
DannyNiu's user avatar
  • 11.7k
0 votes
0 answers
79 views

I have a private wallet backup file from Bitpie/imToken created in June 2023. The new version of the official app no longer supports importing this format. The file content is a JSON object in this ...
MingYang's user avatar
3 votes
1 answer
153 views

In this question, the term “word” implies a binary word, i.e., a sequence of bits. Let $x \oplus y$ denote a result of the bitwise “exclusive or” operation for two words $(x, y)$ of the same length. ...
lyrically wicked's user avatar
0 votes
1 answer
111 views

Has there been any significant Research and findings on secp256k1 (genus 1) to the Jacobian of a higher genus curve, so efficient Index Calculus Algorithms can be built
Vdog90's user avatar
  • 1
6 votes
1 answer
140 views

Are there cryptographic primitives for which, according to the current state of the art, the only known constructions are proven to be secure in the random oracle model but have no security proof in ...
parkingfunc's user avatar
9 votes
2 answers
2k views

Committing security is growing in importance as a set of properties for authenticated encryption in symmetric settings. This notion is defined by Bellare, Hoang, and Wu as: $\underline{\small \textrm{...
aiootp's user avatar
  • 1,324
2 votes
1 answer
158 views

I am a student working on cryptography and have designed a custom Morse-code–based symmetric encryption algorithm. It converts file data into Morse-coded form, applies key-dependent transformations, ...
Deep Ratanpara's user avatar
1 vote
0 answers
47 views

Summary This is an experimental exploration of using high-dimensional vector spaces and invertible neural networks (INNs) to harden classical encryption against potential post-quantum attacks. The ...
Cal's user avatar
  • 11
3 votes
2 answers
146 views

I understand there is a time-bounded challenge in which a message is sent, a computation must be performed, and the result returned within a strict time limit. For example, a random IV (initialization ...
user3696153's user avatar
3 votes
0 answers
56 views

Given a lattice $\Lambda(A)$ and we know the trapdoor for this, say $T_A$. Now can we generate another independent trapdoor $T_{A'}$ for $A'=AU$, for a unimodular matrix $U$? Also I want to ask, is ...
Sanajit Patra's user avatar
2 votes
0 answers
108 views

Imagine Merlin delivers Arthur a blob of data representing a virtual machine state, encrypted via fully homomorphic encryption. This means that Arthur can compute arbitrary boolean circuits on this ...
redroid's user avatar
  • 229
6 votes
2 answers
1k views

Title is the question. Plus: what examples are there? I'm not referring to generalized MAC constructions that plug in a block cipher (CBC-MAC) or a hash function (HMAC, KMAC), nor am I referring to ...
Melab's user avatar
  • 4,338
3 votes
2 answers
423 views

I'm trying to understand the design of RSA(SSA)-PSS, as shown here: https://upload.wikimedia.org/wikipedia/commons/5/53/RSASSA-PSS_PSS-encode.png Two things I don't really understand: Why does the ...
Jörg Ackermann's user avatar

15 30 50 per page
1
2 3 4 5
63