Skip to main content

Questions tagged [reference-request]

A reference request is a request to be provided with a source from documentation, official papers, and specs related to one or more specific algorithms or cryptographic procedures. Open ended literature recommendation requests are off topic! Also: Crypto.SE is not an optimal replacement for a search engine. The reference-request tag is not something that provides a base to replace research efforts.

1 vote
0 answers
98 views

I have read quite a lot about ZKPs, so I THINK to know what a simulation-based proof is (of course I have extensively meet them regarding zero-knowledge-ness), but I often also hear about game-based ...
baro77's user avatar
  • 800
1 vote
0 answers
85 views

In PKC, it's common knowledge that key exchange and public-key encryption are functionally equivalent, and you can get one from the other. Barring semantic security definition difference of course. ...
DannyNiu's user avatar
  • 11.5k
0 votes
0 answers
25 views

I was thinking about one paper I was writing and suddenly it occurred to me that I can build k-out of n oblivious transfer using any of the blindable one-more type problems (One more RSA-inversion, ...
Manish Adhikari's user avatar
2 votes
0 answers
49 views

Newer digital signature designs incorporates pure/pre-hashing metadata, as well as context string intended as a basic form of domain separation for signatures created for different purposes under the ...
DannyNiu's user avatar
  • 11.5k
2 votes
0 answers
60 views

So the Cisco IOS password "encryption" type 7 uses the 4 bit salt/seed to decide which part of the static key to start encrypting from, but I can't find any details on how this salt is ...
n-l-i's user avatar
  • 1,124
3 votes
1 answer
270 views

An ECDSA signature encodes the $(r,s)$ integers each in $[1,n)$, where $n$ is the order of the (sub)group generator. For a standard 256-bit prime curve one standard byte form for such signature is 64-...
fgrieu's user avatar
  • 151k
1 vote
0 answers
80 views

I read a paper in which a tree search algorithm (specifically a DPLL SAT solver) is implemented with garbled circuits. In this tree search algorithm, we have (obviously) the typical 'forward' steps ...
evilquestion's user avatar
3 votes
2 answers
173 views

As someone with a PhD in theoretical crypto, block ciphers are usually just assumed to be some perfect mathematical object, which is used in various proofs... I feel like I should educate myself on ...
eof's user avatar
  • 255
2 votes
0 answers
89 views

The "Similar Questions" section under my title suggest several similar questions on this, but none touched on that explicitly. Because Montgomery curves have birationally equivalent Edwards ...
DannyNiu's user avatar
  • 11.5k
0 votes
0 answers
100 views

I've been learning and implementing standard ring-LWE over $R_t = \mathbb{Z}_t[x]/(x^N+1)$ [1]. In my implementation [2] the inflation ratio is ~192 (it takes 192 bytes to encrypt 1 byte). My ...
Jackson Walters's user avatar
1 vote
1 answer
104 views

I recently learned and implemented NTRU Encrypt successfully in Python/SageMath. The key players are the polynomial rings $R = \mathbb{Z}[x]/(x^N-1)$ and reduction $R_p = \mathbb{Z}_p[x]/(x^N-1)$. One ...
Jackson Walters's user avatar
-1 votes
1 answer
161 views

Do you know of any Rust implementation of ChaCha20/Poly1305 or AES-GCM that uses the GPU (especially CUDA) for encryption?
user3329064's user avatar
2 votes
1 answer
150 views

Suppose Alice chooses a number field $K$ and a polynomial $f(x) \in K[x]$. She computes the splitting field $L$ along with an embedding $\varphi: K \rightarrow L$. In SageMath, ...
Jackson Walters's user avatar
1 vote
0 answers
56 views

I remember that I read a paper a long time ago that makes a claim of the following kind: Although TLS (or perhaps another protocol) is secure in theory, different implementations of it could interpret ...
user2249675's user avatar
2 votes
0 answers
116 views

I am looking for mathematics textbooks which include a rigorous introduction to fully homomorphic encryption and especially CKKS / TFHE algorithms at the level of Boneh and Shoup's A Graduate Course ...
ephe's user avatar
  • 171

15 30 50 per page
1
2 3 4 5
29