Skip to main content

Questions tagged [encoding]

Encoding is the act of transforming information from one form to another. In cryptography, encoding is typically used to refer to an unkeyed process that does not provide any security in itself, but just changes the representation of information into a more convenient form.

4 votes
2 answers
598 views

I wish to have common ASN.1 encoding for all my numerical primitives, whether it is big int or encoded elliptic curve point. Almost always big ints are encoded as ASN.1 INTEGER, but I wish to encode ...
Azii's user avatar
  • 129
1 vote
0 answers
65 views

I am engaged in the translation of encrypted files. I have several files encrypted in the same way. The files consist of two parts: 48 byte header example - ...
Alba's user avatar
  • 11
1 vote
1 answer
83 views

This is a simple question: How many different 26 position Enigma Rotors are possible? NOT including any other Enigma elements such as the plugboard, the reflector, starting positions ring settings, ...
Woodrow Bonewright's user avatar
0 votes
0 answers
37 views

I have to compute a function that is in $NC^0$ or $NC^1$. In what situation will I prefer decomposable randomized encoding over the information theoretic garbled circuit? The protocol design requires ...
Crypto_Research's user avatar
6 votes
3 answers
421 views

I'm analyzing the entropy implications of the following Python code snippet used in an encryption context: ...
UKISU's user avatar
  • 171
3 votes
1 answer
118 views

I've encountered numerous theoretical works on non-malleable codes (NMCs), including constructions for various tampering classes and improvements in efficiency or security models. Some notable ...
user's user avatar
  • 323
1 vote
1 answer
112 views

I have observed an RNG implementation using an HMAC with SHA-256 that takes serverSeed, clientSeed, nonce, and cursor as inputs. For the specific scenario, the cursor remains zero. The key detail is ...
Joey Jolly's user avatar
0 votes
1 answer
59 views

Suppose we talk about NIST P-256 elliptic curve, and since finite field of an elliptic curve is a known prime number $P$, then approximately half of the Weierstrass equation results will be quadratic ...
ojacomarket's user avatar
0 votes
1 answer
142 views

Currently I'm encoding my message using short Weierstrass equation $y^2 = x^3 + Ax + B$ and elliptic curve is NIST-P256, which has $A$, $B$ and $P$(elliptic curve field size) known. Encoding itself is ...
ojacomarket's user avatar
1 vote
1 answer
94 views

I've been reading a blog article on CKKS encoding and there they implement a coordinate-wise random rounding algorithm (which can be found in this paper) instead of the plain old rounding. The same ...
ephe's user avatar
  • 171
1 vote
0 answers
114 views

Let $N$ be a power of two integer and $n$ be a divisor of $N$. We can encode a vector in $\mathbb{C}^{N/2}$ into the polynomial ring $R=\mathbb{Z}[X]/(X^N+1)$ as described in the original CKKS paper ...
ephe's user avatar
  • 171
0 votes
0 answers
126 views

TLDR I want to generate an X25519 keypair and then store it in a single file for easier handling, but I cannot use a keystore like PKCS#12. Why OpenSSL makes it quite easy to generate a private key in ...
Leprechaun's user avatar
1 vote
1 answer
146 views

I'm trying to understand if using non-injective encodings for Elliptic Curve ElGamal encryption is dangerous. A standard probabilistic encoding defined by Koblitz for elliptic curves over $\mathbb{F}...
pintor's user avatar
  • 558
0 votes
0 answers
45 views

A Boolean cardinality constraint $$\sum_{j=0}^{n-1}x_j=k,$$ where $x_j$’s are Boolean variables, and $k$ is a non-negative integer. How to express the Boolean cardinality constraint to CNF formulas?
mini minions's user avatar
2 votes
1 answer
245 views

As we know, the popular PEM format for textualizing private key binary blobs uses base64 encoding. Typical base64 codecs use look-up tables to find characters and byte values and pack them together, ...
DannyNiu's user avatar
  • 11.5k

15 30 50 per page
1
2 3 4 5
10