Skip to main content

Questions tagged [programming-interface]

2 votes
2 answers
105 views

Simple, I���ve curve defined as $Y^2 = X^3 + \frac{3}{i+9}$ defined over finite field $\mathbb F_{p^2}=\frac {\mathbb F_p[i]}{i^2 + 1}$ with $p=...
user2284570's user avatar
1 vote
1 answer
91 views

Simple question. in order to declare a regular $\mathbb F_p^2$ finite field, one can do something GF(7^2) but how to declare a finite field like $\mathbb F_p^2=\...
user2284570's user avatar
3 votes
3 answers
266 views

I want to implement the 2-party PFE protocol of Katz and Malka (from their Asiacrypt 2011 paper: https://eprint.iacr.org/2010/528). I wanted to ask if there is a strong reason for me to choose one of ...
Mahyar's user avatar
  • 75
1 vote
0 answers
177 views

i'm checking to see if there is any API or mechanism to enable or disable the FIPS Mode during the run time. Currently the only way to change the FIPS mode is to enable the algorithm_sect (...
Zoeb Vora's user avatar
2 votes
1 answer
175 views

I wish to do arithmetic on elements in an integer subring of a cyclotomic number field, i.e, in $\mathcal{O}_K = \mathbb{Z}(\zeta) \cong \mathbb{Z}[X] / <\phi_m(x)>$ where $\zeta$ is a root of ...
Rohit Khera's user avatar
9 votes
3 answers
2k views

So far I mostly saw Python (because of simplicity) and C (because of efficiency) for cryptographic programming. But there is a different kind of programming languages called functional programming ...
Titanlord's user avatar
  • 2,812
0 votes
1 answer
327 views

I am currently making a Python game where the user's high score gets encrypted and stored in a log (a text file). The reason for this encryption is because I don't want the user to be able to enter ...
CheetSheatOverlode's user avatar
1 vote
1 answer
1k views

I am writing code for Elliptic Curve Cryptography. I have a class class EllipticCurvePoint. ...
Orwell's user avatar
  • 11
1 vote
1 answer
186 views

Some time ago, I proposed making the site more educational by teaching correct cryptographic programming. The proposal had had somewhat good reception, but was met with cold ice as there had been ...
-2 votes
3 answers
720 views

So normally if you do encrypt('a') twice in a row you'll get the same result. But sometimes (as is the case in SSH) this is not desirable. You want ...
neubert's user avatar
  • 2,969