1. Question about calculation amount for proportion of collision pair and preimage

  2. AES encryption using a Diffie-Hellman question

  3. Key strenth in Cipher cascades (Veracrypt)

  4. AES encryption algorithm (MIX COLUMNS)
  5. AES Encryption using C# and Decryption using Java (Android)

  6. Crypt-analysing modified AES algorithm with no shift-rows, and no key-expansion

  7. Is using the same IV in AES similar to not using an IV in the first place?

  8. Is there a real purpose to use Twofish, Serpent or Threefish instead of AES?
  9. Properties of a single-message protocol using AES
  10. Any point to AES on password with hardcoded key?

  11. attack_wrapper tool for DPA contest isn't working
  12. Understanding how to use RSA and AES in S/MIME

  13. Understanding WannaCrypt's hybrid encryption scheme

  14. Create encfs key and salt deterministically
  15. Security of the AES with a Secret S-box

  16. Using multiple cryptographic keys for encryption?
  17. AES S-box calculation

  18. Does AES scale with bigger block sizes
  19. Number of Substitution boxes
  20. AES in OFB mode and IVs
  21. Can someone explain this math to me

  22. Choice of multiplication polynomial in Rijndael s-box affine mapping

  23. Is it secure to hash an AES key?

  24. AES s-box – How do I calculate the inverse of this field equation?

  25. What kind of ciphers does not depend on order of operation?

  26. AES S-Box: How is value for 01 mapped to 7c?

  27. the counter mode of encryption CTR - AES

  28. Affine of Inverse Sboxes
  29. AES S-Box: Possible options for constant to calculate S-Box values
  30. Use AES in Web Crypto with public/private key pair

  31. Node.js/OpenSSL crypto library equivalent of a Rijndael implementation
  32. Can Whirlpool take advantage of AES-NI?

  33. symmetric AES encryption with php produces different result than openssl MacOX
  34. Problems key AES 128 key from last round key

  35. Manipulate encrypted file: AES / ECB / PKCS5Padding
  36. Matyas–Meyer–Oseas for super-fast single-block hash function
  37. Why we use a fixed inverse Multiplication Matrix in AES

  38. AES: How to create the S-box with Sage

  39. In a 10-round AES (with 128-bit key), can I recover the main key from a round key?

  40. Is it enough to encrypt then sign when using symmetric-key encryption?

  41. PKCS #11 – Deriving a Key where MSB perform encryption and LSB perform CMAC operation?

  42. AES S-Box Lookup Table Hardcoded?

  43. GPG AES-256 Malleability
  44. Isn't AES-NI useless because now the key length need to be longer?
  45. Are sufficiently large key sizes enough to deter quantum attacks for symmetric key ciphers?

  46. Is it possible to crack AES 128 key if one can use the key to encrypt arbitrary data block?
  47. AES S-box input and output question
  48. Preventing replay attacks in a Web API that uses AES256
  49. AES cache-timing attacks and nonce-based operation modes
  50. Why the AES perform encryption in 10 rounds Instead of one?

  51. How long would it take to brute force an AES-128 key?
  52. DES and AES cryptography

  53. Can we prove possession of an AES-256 key without showing it?
  54. Can Bob prove that Alice have a key which encrypts C into A?
  55. How do we reduce the multiplications in the AES mix column layer using $x^4 +1$
  56. How to confirm a program/code is secure?
  57. Why is Byte-at-a-time ECB decryption a vulnerability?

  58. Practical implications of the switching lemma and the counter mode security bound

  59. Why Camellia paper declares that it is faster than Rijndael while it is actually much slower?
  60. Key recovery after AES-ECB encryption of two blocks with some known plaintext/ciphertext

  61. at rest encrypton question from someone who knows nothing
  62. CBC-MAC 8 octet ICV compatable with 16 octet block size?

  63. How to find an S-box inverse value using an alternative equation for the AES S-box?

  64. Why is it inadvisable to increase the number of rounds or using a larger block size to a published(standardized) block cipher such as AES?

  65. Is clientside encryption to hide data from server safe when using SSL?
  66. Using OpenSSL to emulate LTO 4 tape encryption

  67. Can tweaking a cipher have the same or similar effect as changing the key?
  68. Can I decrypt messages encrypted with AES 128 knowing the cipher text and the plaintext?

  69. Is there any open-source white-box implementation of AES or DES?

  70. Deciding on an AES cipher mode for chunked data

  71. AES key from encrypted text and IV

  72. Why this complexity defining AES-GCM counter block?
  73. Block Ciphers with encryption speed similar to AES
  74. AES in CTR mode, with a single key, and an IV derived from the plaintext

  75. bruteforce on aes 256 cbc mode

  76. Why hash ( clear text + Secret ) instead of hash (encrpt(clear text) [ + secret ] )
  77. Symmetric cipher speed (AES vs Camellia vs Twofish)

  78. What cryptographic primitives use AES or its Round function?

  79. AES CBC: Use hash of key as IV when every key is unique?

  80. Expressing a given linear transformation in Galois Field GF(256) in terms of another linear transformation with a different reduction polynomial

  81. Difference between an affine transform and isomorphic transform in GF(2)?
  82. Twofish vs. Serpent vs. AES (or a combo)

  83. Encrypt than MAC scheme for Home Security system

  84. How insecure is AES-128-CTR to encrypt any kind of data using the Ethereum keystore file format?

  85. Is fixed key AES in counter mode a PRG?
  86. How were the best AES whiteboxes in the CHES 2017 CTF challenge built and broken?

  87. Add authenticated encryption additional data (AEAD) to data encryption key (DEK)?

  88. Is my AES-128-CTR implementation secure enough to encrypt private keys and mnemonic seed?

  89. When it is safe to reuse IV? (or not using at all)

  90. CMAC Generation : If input payload length is not aligned in 16 bytes, what are the possible side effects?
  91. AES Fault Attack

  92. Storing Encrypted data in a mobile client
  93. Possible CPA or CCA attack when using AES-CBC mode under the following situation?

  94. Establish a secure connection between a Bluetooth Low Energy device and an Android App using ECDH
  95. A Lightweight Matrix Suggestion for MixColumns State of AES

  96. Is this a typo/error in the Galois/Counter mode specification or have I misunderstood?
  97. Can we always find a key to map a given plaintext block to a given ciphertext block in AES?
  98. Is AES + RSA Encryption of individual log entries with the same key but different IVs secure?

  99. How are Rijndael's S-Boxes generated?

  100. Replacing a block cipher's key schedule with a stream cipher