algorithm-design

  1. What’s the difference between a Fast wide pipe and a Narrow pipe construction?

  2. Can you help me understand pairing $e:G \times G \to G_T$ and ( Decision) BDH assumption?

  3. Does a conditional statement depending on a round number introduce timing attack problems?

  4. How do quantum key distribution systems tolerate noise?
  5. What are the Evaluation Meassures of Public key cryptography algorithm

  6. Is it possible to attack an SHA-256 hash seeded with PHP’s mt_rand function?

  7. Proof that this is not a secure pseudorandom function?
  8. Anti-spamming hash-based proof-of-work?

  9. Cryptanalysis on block cipher (What is exactly a zero correlation attack?)
  10. How to apply Lagrange interpolation to create AES S-box using Sage
  11. Different patterns of different paterns, wildcard

  12. Why can an arbitrary compression function mapping $\{0,1\}^{m+2^m} \rightarrow \{0,1\}^m$ not seriously be considered collision resistant?

  13. Is this or similar problem is solved

  14. AES: How to create the S-box with Sage

  15. Explain the mathematical definition of a cryptosystem using words
  16. New Passwording?
  17. How did someone discover N, order of G for SECP256k1?

  18. How can we create the AES S-box using a different irreducible polynomial?
  19. How does the nonlinear function of KeeLoq work?

  20. Is there a secure, anonymous peer to peer matching solution?

  21. How does Web Cryptography API produce secure PRNG?
  22. Is the SHA-family of hash functions surjective onto their domain with each element equally likely?
  23. What are the differences Between “White-Box Cryptography” and “Code Obfuscation”?
  24. What is the difference between key size and block size (for AES)?
  25. Inverting the encryption equation of a symmetric cipher

  26. Encrypting source code for github

  27. reducing computation of branch number?

  28. How are Elliptic Curve private and public keys actually used to encrypt or sign data?
  29. Homogenous vs heterogeneous unbalanced Feistel networks?

  30. What 'exactly' are AES dual ciphers?
  31. AES: a question about dual ciphers and security
  32. Kerckhoffs’ principles – Why should I make my cipher public?

  33. Security of AES under modification of Sboxes and/or MDS mixing layer
  34. Permutation using cryptography instead of Fisher-Yates
  35. How do we know a cryptographic primitive won't fail suddenly?

  36. Is there an encryption algorithm with a key that can only be used to decrypt?

  37. Using non-standard constants for SHA-256

  38. Proof of Disclosure? Is there such a thing?

  39. Crypto-Compression Algorithms?

  40. (AES in mind) How can we show two irreducible polynomials have a bit-wise linear isomorphism

  41. If we use another irreducible polynomial for AES how can we show it is still resistant to DCA and LCA?

  42. How to transform a text into numbers in the shortest way possible?

  43. How to combine AES-CMACs
  44. What's a cryptographic primitive, really?

  45. Cryptography math requirements

  46. What are recommended, general strategies to start block-cipher design and/or analysis?
  47. An unbreakable book cipher?

  48. Is encryption possible without secure random numbers?
  49. linkable tokens
  50. Is it possible to attack RSA with a WalkSat derivative?
  51. How can an amateur introduce a cryptographic algorithm?

  52. Confusion and Diffusion in the AES functions

  53. Does a two-way fixed-length hash function exist?
  54. Primitive polynomials and irreducible polynomials?
  55. Which precautions to protect against side-channel attacks on ARX ciphers?

  56. What are the "natural language input messages" that were used to derive Streebog's constants?
  57. Why are the right halves kept unchanged in Feistel networks?

  58. In a Feistel cipher structure, what exactly does the "round function $F$" do?

  59. What would be the most efficient way to find two large (2048bit) integers $k$ and $q$ such that $p = kq + 1$ is prime and so is $q$?
  60. Is $a b + e \mod P$ hard to invert?

  61. Does the prime modulus have to be bigger that the generator?
  62. Simple compression functions an sponge functions for educational purposes

  63. Key vs Algorithm when applied to Enigma
  64. Getting the Encryption Function From the Decryption Function + Decryption Key + Encrypted Item
  65. Online attendance system

  66. Antshares (NEO) algorithm (dbft) - Vulnerability to attacks - Game theory

  67. A novel encryption method using only a (huge) lookup table. Is this remotely secure?
  68. Effective security of block cipher – equal the key size, or half the key size?
  69. Skein state size advantages
  70. Is there a way of increasing the time to brute force a cipher, but by increasing the ciphertext size instead of the key size?

  71. What is the purpose of the middle-man actor in chaffing and winnowing?

  72. Just how surjective is a cryptographic hash like SHA-1?
  73. Cryptographic Tagging of Information over an Insecure Channel

  74. Double-CBC as AES-KW Substitute?
  75. Math to replace s-boxes - Good or bad idea?

  76. Alternatives to sbox's for diffusion?

  77. How do fast multiplication algorithms deal with cryptanalysis?

  78. Can we widen hash functions with concatenation?
  79. Pollard's kangaroo attack on Elliptic Curve Groups
  80. Understanding an encryption technique algorithm

  81. FHMQV-C \sigma calculation - Full Dual Exponential Challenge Response (FDCR) signature schemes-

  82. Key generation algorithm based on bytes in a drive
  83. Average number of multiplications in left-to-right k-ary exponentiation
  84. Looking for the inverse of the following equation

  85. Want to generate numeric coupon codes?
  86. Difference between stream cipher and block cipher

  87. Post-Quantum Object Sizes.
  88. Abstracting primitives and modes of operation
  89. Usefulness of Damgård–Jurik

  90. Proof for the SHA3 claim that 256 bit security is "post-quantum sufficient"?
  91. How to prove security of a randomized encryption algorithm?
  92. Does pairings based cryptography inherently require a CRS/trusted setup?

  93. DRM simple clone

  94. Is there a standard, or widely accepted convention, for magic constants in crypto software?

  95. What's the difference between word-oriented and byte-oriented ciphers?
  96. Secret Sharing Scheme with variable share size?

  97. Is building your own inefficient but secure cipher hard?
  98. Are there any applications of Lie algebras or Lie groups in cryptography?
  99. AES parameters specifications

  100. Full diffusion or Partial diffusion between s-box applications?