|
20h
|
|
awarded | Editor |
|
20h
|
|
revised |
Do KEMs protect against malicious public (encapsulating) keys? Added background section. |
|
20h
|
|
comment |
Do KEMs protect against malicious public (encapsulating) keys? If I understand correctly, you're saying that KEMs using Fujisaki-Okamoto construction should be immune from the attack? |
|
1d
|
|
awarded | Student |
|
1d
|
|
asked | Do KEMs protect against malicious public (encapsulating) keys? |
|
Jan
8 |
|
awarded | Supporter |
| 2025 | |||
|---|---|---|---|
|
Jul
3 |
|
comment |
How can I parse a host:port pair in Python @JérômePouiller If you need to parse a bare IPv6 literal address without square brackets, then no, this solution does not work. The OP specifies IPv6 literals in square brackets, which is required in host names. |
|
Jun
12 |
|
awarded | Commentator |
|
Jun
11 |
|
comment |
Windows Defender keeps closing some apps after a few seconds @bzmind Your best bet is to get one of the bootable antivirus disks, boot your system from it, and do a full scan of the system's internal drive as well as any USB drives. Do keep in mind, though, that scanning and repairing infected files may end up damaging them, and may not return them to a pre-infection state. Many paid antivirus vendors provide free bootable disks, one such example is Kaspersky's free rescue disk (not an endorsement), and I'm sure there are many others. |
|
Jun
11 |
|
comment |
Windows Defender keeps closing some apps after a few seconds @bzmind Anything, and I do mean anything, your computer has previously touched could have malware in it. Application installers downloaded via that computer. USB drives ever plugged into that computer. Network shares you have ever browsed from that computer. Cloud storage that has ever synced from that computer. Ideally, you should wipe all of it. For anything you're not willing to wipe, find one of those antivirus boot disks, boot your computer from that and scan everything. |
|
Jun
11 |
|
comment |
Windows Defender keeps closing some apps after a few seconds It seems many people have forgotten that malware can infect other files, including the executable of other software, shortcuts, autorun.inf, and even replacing folders with exes with a folder icon. When OP reinstalled Windows without wiping the entire drive, as soon as they executed any leftover app, double clicked on an unformatted drive, or even just browsed some infected folder, they are immediately reinfected. |
|
May
7 |
|
comment |
Why do encryption algorithms not consider the length of the message to be encrypted as sensitive information? I would like to flesh out the "reasonable different option" mentioned by @poncho. If the thing you're trying to encrypt is an integer number up to 10 digits long, the most "natural" way to represent it should be a 64-bit integer (either signed or unsigned), which is a fixed 8 bytes long, automatically solving the length leakage problem for you. But of course, it depends on your actual unstated requirements: is the thing you're encrypted like a phone number where leading zeros could be present, etc.? |
|
May
2 |
|
awarded | Yearling |
|
May
2 |
|
awarded | Yearling |
|
Apr
30 |
|
revised |
How to identify which USB device is failing? added 33 characters in body |
|
Apr
30 |
|
answered | How to identify which USB device is failing? |
| 2024 | |||
|
Nov
15 |
|
comment |
How to setup a tftp server to serve firmware to a switch? And in case of a Windows computer, tftpd64 pjo2.github.io/tftpd64 is an application that provides both dhcp server and tftp server functionality. (I remember using tftpd32 10+ years ago.) |
|
Aug
26 |
|
awarded | Custodian |
|
Aug
26 |
|
reviewed | Looks OK How to increase numbers in filenames by specified value with Windows 10 PowerToys's PowerRename? |
|
Jul
23 |
|
awarded | Nice Answer |