Skip to main content

Explore our questions

0 votes
1 answer
127 views

Can a PPT adversary get secret $a$ from public messages $m_i=x_i-a \mod p-1$ for i=1,2, ...,n?

0 votes
2 answers
60 views

Can each participant do his own encrpytion and decryption with a random order

1 vote
2 answers
172 views

PKCS7 padding theory vs practice

2 votes
1 answer
111 views

Code implementing efficient knapsack attacks (Howgrave-Graham and Joux / Becker Coron Joux)?

1 vote
1 answer
79 views

Vigenere understanding and clarification between modulo, key length, plaintext length, plaintext alphabet length?

2 votes
3 answers
309 views

Is it safe to "sign" a message with such a zk proof

1 vote
3 answers
557 views

Zero-Knowledge Proof of Encryption with a Specific Key

2 votes
0 answers
61 views

Twist and Shout

3 votes
2 answers
970 views

Chacha20 random nonce + counter

3 votes
2 answers
255 views

On the unfoundedness of signing as "inverse" of public-key decryption

3 votes
1 answer
121 views

Is this type of column parity mixer necessarily invertible?

-1 votes
1 answer
139 views

Is the following commitment scheme hiding? Is it binding?

5 votes
2 answers
1k views

Is it insecure to use a hash with secret salt instead of a signature?

1 vote
0 answers
25 views

Proving coefficients of vector of polynomials are binary (LaBRADOR)

Browse more Questions