Skip to main content
DannyNiu's user avatar
DannyNiu's user avatar
DannyNiu's user avatar
DannyNiu
  • Member for 9 years, 7 months
  • Last seen this week
3 votes
2 answers
399 views

Do Korea and Japan have their own national hashing standard?

2 votes
0 answers
217 views

How are ChaCha-based ARC4Random CSPRNGs initialized and reseeded?

2 votes
1 answer
152 views

How does randomized hashing defeat collision attack?

2 votes
2 answers
169 views

What are the typical instance parameters of non-commutative cryptographic schemes?

2 votes
2 answers
564 views

Does SHA-256 have (128-time + 128-space = 256-overall)-bit collision resistance?

2 votes
1 answer
145 views

Is matrix elliptic curve discrete logarithm problem quantum-safe?

2 votes
2 answers
421 views

How to handle modular arithmetic with regard to two's-complement negative numbers?

2 votes
0 answers
115 views

SSL/TLS Forward secrecy with 2 KEM public keys

2 votes
1 answer
300 views

Is it possible to create a Dilithium Prime or Falcon Prime?

2 votes
0 answers
120 views

Are blockciphers with 64-bit blocks still relevant (in any scenario)?

2 votes
0 answers
125 views

What motivated CCM's monstrous design?

2 votes
1 answer
83 views

How to determine whether a point is at infinity in homogenous coordinates?

2 votes
2 answers
216 views

*-LWE equivalent of Diffie-Hellman $g^{x^2}$ vulnerability

2 votes
1 answer
147 views

How important is constant-time verification of lHash label in RSA-OAEP?

2 votes
1 answer
326 views

Double-CBC as AES-KW Substitute?

2 votes
1 answer
233 views

NIST DRBG algorithms' optional parameter

2 votes
3 answers
612 views

Are XOFs and KDFs more usable than DRBGs?

2 votes
1 answer
127 views

Can HKDF be instantiated with HMAC-SWIFFT?

2 votes
2 answers
589 views

Choosing between RLWE-KEX methods.

2 votes
2 answers
278 views

How would low-precision Gaussian sampling impact the security of BLISS?

2 votes
0 answers
54 views

Reference request: 256-byte digital signature metadata block format

2 votes
0 answers
93 views

Does the supposed domain separation make it safe to reuse Ed25519 public key for Curve25519 key establishment?

2 votes
0 answers
61 views

I just want a post-quantum permutation and I don't care about efficiency. Can multivariate reciprocals help me?

2 votes
1 answer
231 views

Does it make sense to offer only 512-bit hash in a post-quantum DSS?

2 votes
1 answer
113 views

Is this half-smart way of verifying EdDSA signature secure?

2 votes
1 answer
120 views

API design that maximizes the potential of parallel and tree hashing

2 votes
1 answer
99 views

ML-DSA without lattice

2 votes
0 answers
66 views

Is solving MQ systems hardest when the number of equations equals the number of unknowns?

2 votes
1 answer
265 views

Constant-Time Base64 Codec - Necessity and Implementation

2 votes
0 answers
119 views

Is polynomial the answer?