Questions tagged [programming-interface]
The programming-interface tag has no summary.
10 questions
2
votes
2
answers
105
views
How to untwist a curve point from the twisted bn128 over $\mathbb F_{p^2}$ to bn128 over $\mathbb F_{p^{12}}$ using their homorphism?
Simple, I���ve curve defined as $Y^2 = X^3 + \frac{3}{i+9}$ defined over finite field $\mathbb F_{p^2}=\frac {\mathbb F_p[i]}{i^2 + 1}$ with $p=...
1
vote
1
answer
91
views
How to declare a twisted finite field like $\mathbb F_p^2=\mathbb F_p[x]$ ÷ ($x^2$ + 1) in SageMath? [closed]
Simple question.
in order to declare a regular $\mathbb F_p^2$ finite field, one can do something GF(7^2) but how to declare a finite field like $\mathbb F_p^2=\...
3
votes
3
answers
266
views
What language is better for implementing a private function evaluation protocol?
I want to implement the 2-party PFE protocol of Katz and Malka (from their Asiacrypt 2011 paper: https://eprint.iacr.org/2010/528). I wanted to ask if there is a strong reason for me to choose one of ...
1
vote
0
answers
177
views
is there any Openssl 3.x API for enabling and disabling FIPS mode?
i'm checking to see if there is any API or mechanism to enable or disable the FIPS Mode during the run time.
Currently the only way to change the FIPS mode is to enable the algorithm_sect (...
2
votes
1
answer
175
views
Arithmetic in Cyclotomic Number Rings with Shoup's Number Theory Library (NTL)
I wish to do arithmetic on elements in an integer subring of a cyclotomic number field, i.e, in $\mathcal{O}_K = \mathbb{Z}(\zeta) \cong \mathbb{Z}[X] / <\phi_m(x)>$ where $\zeta$ is a root of ...
9
votes
3
answers
2k
views
Benefits of functional programming languages
So far I mostly saw Python (because of simplicity) and C (because of efficiency) for cryptographic programming. But there is a different kind of programming languages called functional programming ...
0
votes
1
answer
327
views
Is there a function similar to a hash function, but it's reversible?
I am currently making a Python game where the user's high score gets encrypted and stored in a log (a text file). The reason for this encryption is because I don't want the user to be able to enter ...
1
vote
1
answer
1k
views
How to represent the point-at-infinity(Elliptic Curves) in code? [duplicate]
I am writing code for Elliptic Curve Cryptography. I have a class class EllipticCurvePoint.
...
1
vote
1
answer
186
views
The goal, the method, and the interface of the signcrypt primitive.
Some time ago, I proposed making the site more educational by teaching correct cryptographic programming. The proposal had had somewhat good reception, but was met with cold ice as there had been ...
-2
votes
3
answers
720
views
what is it called when encrypt('a') || encrypt('a') == encrypt('aa')?
So normally if you do encrypt('a') twice in a row you'll get the same result. But sometimes (as is the case in SSH) this is not desirable. You want ...