Skip to main content

20h
awarded Editor
20h
revised Do KEMs protect against malicious public (encapsulating) keys?
Added background section.
20h
comment Do KEMs protect against malicious public (encapsulating) keys?
If I understand correctly, you're saying that KEMs using Fujisaki-Okamoto construction should be immune from the attack?
1d
awarded Student
1d
asked Do KEMs protect against malicious public (encapsulating) keys?
Jan
8
awarded Supporter
2025
Jul
3
comment How can I parse a host:port pair in Python
@JérômePouiller If you need to parse a bare IPv6 literal address without square brackets, then no, this solution does not work. The OP specifies IPv6 literals in square brackets, which is required in host names.
Jun
12
awarded Commentator
Jun
11
comment Windows Defender keeps closing some apps after a few seconds
@bzmind Your best bet is to get one of the bootable antivirus disks, boot your system from it, and do a full scan of the system's internal drive as well as any USB drives. Do keep in mind, though, that scanning and repairing infected files may end up damaging them, and may not return them to a pre-infection state. Many paid antivirus vendors provide free bootable disks, one such example is Kaspersky's free rescue disk (not an endorsement), and I'm sure there are many others.
Jun
11
comment Windows Defender keeps closing some apps after a few seconds
@bzmind Anything, and I do mean anything, your computer has previously touched could have malware in it. Application installers downloaded via that computer. USB drives ever plugged into that computer. Network shares you have ever browsed from that computer. Cloud storage that has ever synced from that computer. Ideally, you should wipe all of it. For anything you're not willing to wipe, find one of those antivirus boot disks, boot your computer from that and scan everything.
Jun
11
comment Windows Defender keeps closing some apps after a few seconds
It seems many people have forgotten that malware can infect other files, including the executable of other software, shortcuts, autorun.inf, and even replacing folders with exes with a folder icon. When OP reinstalled Windows without wiping the entire drive, as soon as they executed any leftover app, double clicked on an unformatted drive, or even just browsed some infected folder, they are immediately reinfected.
May
7
comment Why do encryption algorithms not consider the length of the message to be encrypted as sensitive information?
I would like to flesh out the "reasonable different option" mentioned by @poncho. If the thing you're trying to encrypt is an integer number up to 10 digits long, the most "natural" way to represent it should be a 64-bit integer (either signed or unsigned), which is a fixed 8 bytes long, automatically solving the length leakage problem for you. But of course, it depends on your actual unstated requirements: is the thing you're encrypted like a phone number where leading zeros could be present, etc.?
May
2
awarded Yearling
May
2
awarded Yearling
Apr
30
revised How to identify which USB device is failing?
added 33 characters in body
Apr
30
answered How to identify which USB device is failing?
2024
Nov
15
comment How to setup a tftp server to serve firmware to a switch?
And in case of a Windows computer, tftpd64 pjo2.github.io/tftpd64 is an application that provides both dhcp server and tftp server functionality. (I remember using tftpd32 10+ years ago.)
Aug
26
awarded Custodian
Aug
26
reviewed Looks OK How to increase numbers in filenames by specified value with Windows 10 PowerToys's PowerRename?
Jul
23
awarded Nice Answer
1 2 3 4 5