<we><edit> <!-- questions and answers -->
one-time-pad
hash
finite-field
cbc
chosen-plaintext-attack
protocol-design
cbc-mac
homomorphic-encryption
side-channel-attack
reference-request
lattice-crypto
elgamal-encryption
stream-cipher
sha-1
symmetric
multiparty-computation
nonce
algorithm-design
hmac
block-cipher
substitution-cipher
ed25519
performance
authentication
ctr
aes
Question about calculation amount for proportion of collision pair and preimage
aes
collision-resistance
preimage-resistance
compression-function
AES encryption using a Diffie-Hellman question
encryption
aes
diffie-hellman
Key strenth in Cipher cascades (Veracrypt)
encryption
aes
twofish
serpent
AES encryption algorithm (MIX COLUMNS)
aes
AES Encryption using C# and Decryption using Java (Android)
encryption
aes
Crypt-analysing modified AES algorithm with no shift-rows, and no key-expansion
aes
Is using the same IV in AES similar to not using an IV in the first place?
encryption
aes
symmetric
initialization-vector
Is there a real purpose to use Twofish, Serpent or Threefish instead of AES?
aes
block-cipher
twofish
serpent
threefish
Properties of a single-message protocol using AES
aes
protocol-analysis
Any point to AES on password with hardcoded key?
aes
passwords
attack_wrapper tool for DPA contest isn't working
aes
attack
side-channel-attack
dpa
Understanding how to use RSA and AES in S/MIME
encryption
rsa
aes
public-key
s-mime
Understanding WannaCrypt's hybrid encryption scheme
encryption
rsa
aes
public-key
Create encfs key and salt deterministically
aes
key-derivation
file-encryption
Security of the AES with a Secret S-box
aes
randomness
s-boxes
differential-analysis
Using multiple cryptographic keys for encryption?
aes
multiple-encryption
AES S-box calculation
aes
s-boxes
Does AES scale with bigger block sizes
aes
rijndael
standards
Number of Substitution boxes
aes
s-boxes
substitution-cipher
AES in OFB mode and IVs
aes
initialization-vector
ofb
Can someone explain this math to me
aes
Choice of multiplication polynomial in Rijndael s-box affine mapping
aes
finite-field
s-boxes
rijndael
Is it secure to hash an AES key?
aes
collision-resistance
sha-3
AES s-box – How do I calculate the inverse of this field equation?
encryption
aes
s-boxes
cryptographic-hardware
What kind of ciphers does not depend on order of operation?
encryption
aes
tls
AES S-Box: How is value for 01 mapped to 7c?
aes
finite-field
s-boxes
the counter mode of encryption CTR - AES
encryption
aes
Affine of Inverse Sboxes
aes
s-boxes
AES S-Box: Possible options for constant to calculate S-Box values
aes
finite-field
s-boxes
Use AES in Web Crypto with public/private key pair
aes
Node.js/OpenSSL crypto library equivalent of a Rijndael implementation
aes
openssl
rijndael
Can Whirlpool take advantage of AES-NI?
hash
aes
implementation
symmetric AES encryption with php produces different result than openssl MacOX
aes
openssl
Problems key AES 128 key from last round key
aes
block-cipher
key-derivation
Manipulate encrypted file: AES / ECB / PKCS5Padding
aes
ecb
Matyas–Meyer–Oseas for super-fast single-block hash function
hash
aes
block-cipher
algorithm-design
post-quantum-cryptography
Why we use a fixed inverse Multiplication Matrix in AES
encryption
aes
AES: How to create the S-box with Sage
aes
block-cipher
algorithm-design
s-boxes
In a 10-round AES (with 128-bit key), can I recover the main key from a round key?
encryption
aes
rijndael
Is it enough to encrypt then sign when using symmetric-key encryption?
encryption
aes
symmetric
PKCS #11 – Deriving a Key where MSB perform encryption and LSB perform CMAC operation?
aes
key-derivation
cryptographic-hardware
pkcs11
AES S-Box Lookup Table Hardcoded?
aes
s-boxes
GPG AES-256 Malleability
encryption
aes
sha-256
pgp
malleability
Isn't AES-NI useless because now the key length need to be longer?
aes
block-cipher
symmetric
Are sufficiently large key sizes enough to deter quantum attacks for symmetric key ciphers?
aes
symmetric
post-quantum-cryptography
quantum-resistance
Is it possible to crack AES 128 key if one can use the key to encrypt arbitrary data block?
encryption
aes
block-cipher
AES S-box input and output question
aes
rijndael
Preventing replay attacks in a Web API that uses AES256
aes
nonce
replay-attack
aes-gcm
AES cache-timing attacks and nonce-based operation modes
aes
gcm
timing-attack
ccm
Why the AES perform encryption in 10 rounds Instead of one?
aes
xor
How long would it take to brute force an AES-128 key?
encryption
aes
brute-force-attack
DES and AES cryptography
aes
des
Can we prove possession of an AES-256 key without showing it?
aes
zero-knowledge-proofs
Can Bob prove that Alice have a key which encrypts C into A?
aes
zero-knowledge-proofs
How do we reduce the multiplications in the AES mix column layer using $x^4 +1$
aes
finite-field
matrix-multiplication
diffusion
How to confirm a program/code is secure?
aes
algorithm-design
provable-security
gcm
pgp
Why is Byte-at-a-time ECB decryption a vulnerability?
aes
ecb
Practical implications of the switching lemma and the counter mode security bound
aes
provable-security
ctr
Why Camellia paper declares that it is faster than Rijndael while it is actually much slower?
aes
camellia
Key recovery after AES-ECB encryption of two blocks with some known plaintext/ciphertext
aes
cryptanalysis
ecb
password-based-encryption
linear-cryptanalysis
at rest encrypton question from someone who knows nothing
encryption
aes
implementation
serpent
CBC-MAC 8 octet ICV compatable with 16 octet block size?
aes
authentication
authenticated-encryption
cbc-mac
ccm
How to find an S-box inverse value using an alternative equation for the AES S-box?
aes
s-boxes
Why is it inadvisable to increase the number of rounds or using a larger block size to a published(standardized) block cipher such as AES?
rsa
aes
cryptanalysis
block-cipher
post-quantum-cryptography
Is clientside encryption to hide data from server safe when using SSL?
aes
pbkdf
Using OpenSSL to emulate LTO 4 tape encryption
encryption
aes
key-derivation
openssl
gcm
Can tweaking a cipher have the same or similar effect as changing the key?
aes
block-cipher
key-reuse
tweakable-cipher
Can I decrypt messages encrypted with AES 128 knowing the cipher text and the plaintext?
encryption
aes
Is there any open-source white-box implementation of AES or DES?
aes
des
implementation
white-box
Deciding on an AES cipher mode for chunked data
aes
aes-gcm
AES key from encrypted text and IV
aes
ciphertext-only-attack
Why this complexity defining AES-GCM counter block?
aes
stream-cipher
aes-gcm
Block Ciphers with encryption speed similar to AES
aes
twofish
camellia
AES in CTR mode, with a single key, and an IV derived from the plaintext
aes
initialization-vector
ctr
deterministic-encryption
bruteforce on aes 256 cbc mode
encryption
aes
cbc
attack
Why hash ( clear text + Secret ) instead of hash (encrpt(clear text) [ + secret ] )
hash
aes
sha-2
ssh
Symmetric cipher speed (AES vs Camellia vs Twofish)
aes
symmetric
twofish
camellia
What cryptographic primitives use AES or its Round function?
aes
algorithm-design
AES CBC: Use hash of key as IV when every key is unique?
aes
Expressing a given linear transformation in Galois Field GF(256) in terms of another linear transformation with a different reduction polynomial
aes
finite-field
matrix-multiplication
Difference between an affine transform and isomorphic transform in GF(2)?
aes
Twofish vs. Serpent vs. AES (or a combo)
encryption
aes
file-encryption
serpent
twofish
Encrypt than MAC scheme for Home Security system
aes
mac
How insecure is AES-128-CTR to encrypt any kind of data using the Ethereum keystore file format?
aes
ctr
cryptocurrency
Is fixed key AES in counter mode a PRG?
aes
modes-of-operation
pseudo-random-generator
How were the best AES whiteboxes in the CHES 2017 CTF challenge built and broken?
aes
white-box
Add authenticated encryption additional data (AEAD) to data encryption key (DEK)?
aes
authenticated-encryption
aes-gcm
Is my AES-128-CTR implementation secure enough to encrypt private keys and mnemonic seed?
aes
public-key
ctr
cryptocurrency
When it is safe to reuse IV? (or not using at all)
aes
initialization-vector
CMAC Generation : If input payload length is not aligned in 16 bytes, what are the possible side effects?
aes
mac
cbc
cbc-mac
cmac
AES Fault Attack
aes
side-channel-attack
Storing Encrypted data in a mobile client
aes
salt
Possible CPA or CCA attack when using AES-CBC mode under the following situation?
aes
cbc
initialization-vector
Establish a secure connection between a Bluetooth Low Energy device and an Android App using ECDH
aes
elliptic-curves
diffie-hellman
A Lightweight Matrix Suggestion for MixColumns State of AES
aes
implementation
Is this a typo/error in the Galois/Counter mode specification or have I misunderstood?
aes
gcm
aes-gcm
Can we always find a key to map a given plaintext block to a given ciphertext block in AES?
aes
pseudo-random-permutation
Is AES + RSA Encryption of individual log entries with the same key but different IVs secure?
rsa
aes
How are Rijndael's S-Boxes generated?
aes
s-boxes
rijndael
Replacing a block cipher's key schedule with a stream cipher
aes
block-cipher
stream-cipher
rijndael
salsa20