25
RSA: What would happen if you chose n to be a prime?
crypto.stackexchange.com
25
Why is the market for cryptographic primitives non-commercialized?
crypto.stackexchange.com
24
Why is a known-plaintext attack considered a complete break?
crypto.stackexchange.com
24
Why hash the message before signing it with RSA?
crypto.stackexchange.com
24
How does a non-prime modulus for Diffie-Hellman allow for a backdoor?
crypto.stackexchange.com
23
why XOR is recommended/Used in every paper I read for encryption and decryption stream cipher?
crypto.stackexchange.com
23
What happens to entropy after hashing?
crypto.stackexchange.com
23
Explanation of the Decision Diffie Hellman (DDH) problem.
crypto.stackexchange.com
22
Why is CRC said to be linear?
crypto.stackexchange.com
22
What are the advantages of a static ECDH key?
crypto.stackexchange.com
21
How hard is it to generate a simultaneous MD5 and SHA1 collision?
crypto.stackexchange.com
21
Why NIST insists on post-quantum standardization procedure rather than post-quantum competition?
crypto.stackexchange.com
21
Coefficients in Shamir's Secret Sharing Scheme
crypto.stackexchange.com
21
Is OTP still perfectly secure if we limit message and key space
crypto.stackexchange.com
21
Best cryptographic algo with asymmetric cost: expensive to sign, cheap to validate
crypto.stackexchange.com
21
Why can an elliptic curve private key be 1?
crypto.stackexchange.com
20
How will the world learn that Q-Day has arrived?
crypto.stackexchange.com
20
One time pad: why is it useless in practice?
crypto.stackexchange.com
20
Is the term "Elliptic Curve Discrete Logarithm Problem" a misnomer?
crypto.stackexchange.com
20
More than one private key for RSA
crypto.stackexchange.com
20
Why is the Pedersen commitment computationally binding?
crypto.stackexchange.com
20
Generate RSA-2048 private key for a VERY fast decryption (don't care if it will be unsecure)
crypto.stackexchange.com
20
Difference between “ECDH with cofactor key” and “ECDH without cofactor key”?
crypto.stackexchange.com
19
Can there be two hash functions without common collisions?
crypto.stackexchange.com
19
For Diffie-Hellman, must g be a generator?
crypto.stackexchange.com
19
Leading 00 in RSA public/private key file
crypto.stackexchange.com
19
Why is ciphertext from low entropy plaintext not compressible?
crypto.stackexchange.com
18
Diffie-Hellman Parameter Check: when g = 2, must p ≡ 11 (mod 24)?
crypto.stackexchange.com
18
Multiplicative inverse in $\operatorname{GF}(2^8)$?
crypto.stackexchange.com
18
Are post-quantum cryptographic ciphers *also* secure if the P=NP conjecture holds true?
crypto.stackexchange.com
prev
1
2
3
4
5
…
10
next