close
Skip to main content

Explore our questions

0 votes
0 answers
10 views

decentralised construction of a list in an unknown order

0 votes
0 answers
22 views

A question about an example of the implementation of the "meeting in the middle" attack

2 votes
1 answer
66 views

Is it reasonable to assume a server holds its own secret key in fully homomorphic encryption?

1 vote
0 answers
42 views

Can ZK-proofs be cut down when used to show that a result of an execution is bound to an identity?

6 votes
1 answer
659 views

Why do post-quantum cryptosystems generally not allow checking ciphertext validity without the secret key?

2 votes
1 answer
266 views

Cryptographic assumptions with bilinear pairings

5 votes
2 answers
162 views

How to compute the maximum number of 1's in the hint of ML-DSA (Dilithium)?

1 vote
0 answers
71 views

Does binding key derivation to an external temporal coordinate (timestamp) improve resilience against offline brute-force attacks?

7 votes
1 answer
2k views

Fixed point in RSA encryption

2 votes
1 answer
133 views

Optimal lattice dimension for hybrid cryptography based on lattices and elliptic curves

0 votes
1 answer
94 views

Letter pair substitution for variable-length plaintext character groupings ‒ Categorization and alternatives?

4 votes
1 answer
389 views

NTT in kyber and dilithium

5 votes
1 answer
1k views

For TCG-Opal drives, which password is used to derive KEK?

6 votes
1 answer
438 views

Is perfect authenticity (without unreasonable assumptions) possible in information-theoretic sense?

Browse more Questions