Skip to main content
DannyNiu's user avatar
DannyNiu's user avatar
DannyNiu's user avatar
DannyNiu
  • Member for 9 years, 7 months
  • Last seen this week
15 votes
2 answers
7k views

How reassuring is 64-bit (in)security?

10 votes
2 answers
1k views

Functional difference between stream cipher, XOF, seed expander, KDF, etc

10 votes
1 answer
522 views

Sponge with PRF instead of PRP

10 votes
3 answers
716 views

How to implement arbitrary s-box in a side-channel-free way in C?

9 votes
4 answers
2k views

80-bit collision resistance because of 80-bit x87 registers?

7 votes
2 answers
753 views

Will a SHAKE128 stream cipher be vulnerable to related key attacks?

6 votes
1 answer
317 views

What's the current status of development of hedged ECDSA and EdDSA?

5 votes
1 answer
976 views

How to build disk encryption system using forward permutations like Gimli?

5 votes
1 answer
362 views

How difficult is inverting a non-square matrix?

5 votes
3 answers
1k views

Anti-spamming hash-based proof-of-work?

5 votes
2 answers
506 views

Recommendation of lightweight RNG for Miller-Rabin primality test

4 votes
1 answer
149 views

Did the formalization of PKCS#1 RSA key formats come before or after X.509?

4 votes
1 answer
316 views

Can modular exponentiation with a public index be considered a secure permutation?

4 votes
1 answer
2k views

What is/was SEC#1 ECC public key leading octet 0x01 for?

4 votes
1 answer
280 views

Is there any "exception-free" coordinates system for Weierstrass curves?

4 votes
2 answers
347 views

(Impossibility of?) Associative Pseudorandom Permutation

4 votes
2 answers
5k views

Any point using CMAC with AES-256?

4 votes
3 answers
2k views

What are the benefits of using AEAD algorithms as MAC

4 votes
1 answer
243 views

What non-trivial benefit does including a "context"/"signer info" provide in SM2-DSS and EdDSA?

4 votes
1 answer
382 views

Is low Hamming weight problem comparably difficult as SIS?

3 votes
1 answer
138 views

Linearization attack on group with automorphism

3 votes
1 answer
460 views

Why in authenticated encryptions do we need separate keys for cipher and MAC?

3 votes
1 answer
419 views

Kyber-CCA-KEM - Deterministic implicit rejection

3 votes
1 answer
130 views

Why do COSE and JOSE use their own format for SEC#1 and PKCS#1 keys?

3 votes
2 answers
2k views

Can I get away with generating 512-bit k (and d) for ECDSA based on P-521?

3 votes
0 answers
136 views

Why is WalnutDSA specified for COSE?

3 votes
2 answers
969 views

How are the instantiations of RSAES-OAEP and SHA*WithRSAEncryption different in practice?

3 votes
1 answer
72 views

Is there any advantage using this kind of ROM-based randomized hashing in digital signatures?

3 votes
1 answer
946 views

Lattice reduction question regarding the capability of LLL and BKZ

3 votes
0 answers
229 views

Does the security proof of HMAC somehow change if it's instantiated with sponge-based hash functions with small rate and large capacity?