<we><edit> <!-- questions and answers -->
security-definition
pseudo-random-function
sha-1
hash-signature
elliptic-curves
gcm
modes-of-operation
brute-force-attack
cbc-mac
ecb
permutation
nonce
known-plaintext-attack
chosen-ciphertext-attack
one-time-pad
complexity
diffie-hellman
cryptographic-hardware
padding
file-encryption
passwords
stream-cipher
pairings
zero-knowledge-proofs
aes
algorithm-design
What’s the difference between a Fast wide pipe and a Narrow pipe construction?
algorithm-design
merkle-damgaard
Can you help me understand pairing $e:G \times G \to G_T$ and ( Decision) BDH assumption?
elliptic-curves
algorithm-design
pairings
Does a conditional statement depending on a round number introduce timing attack problems?
algorithm-design
implementation
timing-attack
How do quantum key distribution systems tolerate noise?
algorithm-design
protocol-design
quantum-cryptography
error-propagation
What are the Evaluation Meassures of Public key cryptography algorithm
encryption
rsa
public-key
cryptanalysis
algorithm-design
Is it possible to attack an SHA-256 hash seeded with PHP’s mt_rand function?
cryptanalysis
algorithm-design
random-number-generator
implementation
sha-256
Proof that this is not a secure pseudorandom function?
cryptanalysis
algorithm-design
pseudo-random-function
Anti-spamming hash-based proof-of-work?
hash
algorithm-design
key-derivation
proof-of-work
Cryptanalysis on block cipher (What is exactly a zero correlation attack?)
cryptanalysis
block-cipher
algorithm-design
linear-cryptanalysis
How to apply Lagrange interpolation to create AES S-box using Sage
aes
block-cipher
algorithm-design
s-boxes
Different patterns of different paterns, wildcard
encryption
algorithm-design
classical-cipher
Why can an arbitrary compression function mapping $\{0,1\}^{m+2^m} \rightarrow \{0,1\}^m$ not seriously be considered collision resistant?
cryptanalysis
algorithm-design
collision-resistance
compression
merkle-damgaard
Is this or similar problem is solved
public-key
algorithm-design
protocol-design
AES: How to create the S-box with Sage
aes
block-cipher
algorithm-design
s-boxes
Explain the mathematical definition of a cryptosystem using words
encryption
algorithm-design
keys
New Passwording?
algorithm-design
passwords
brute-force-attack
password-based-encryption
How did someone discover N, order of G for SECP256k1?
public-key
elliptic-curves
algorithm-design
How can we create the AES S-box using a different irreducible polynomial?
aes
algorithm-design
s-boxes
How does the nonlinear function of KeeLoq work?
algorithm-design
implementation
Is there a secure, anonymous peer to peer matching solution?
algorithm-design
How does Web Cryptography API produce secure PRNG?
algorithm-design
random-number-generator
pseudo-random-generator
Is the SHA-family of hash functions surjective onto their domain with each element equally likely?
hash
signature
algorithm-design
authentication
What are the differences Between “White-Box Cryptography” and “Code Obfuscation”?
algorithm-design
terminology
white-box
What is the difference between key size and block size (for AES)?
aes
block-cipher
algorithm-design
keys
terminology
Inverting the encryption equation of a symmetric cipher
symmetric
algorithm-design
Encrypting source code for github
algorithm-design
file-encryption
reducing computation of branch number?
block-cipher
algorithm-design
diffusion
How are Elliptic Curve private and public keys actually used to encrypt or sign data?
elliptic-curves
algorithm-design
implementation
Homogenous vs heterogeneous unbalanced Feistel networks?
encryption
cryptanalysis
algorithm-design
symmetric
feistel-network
What 'exactly' are AES dual ciphers?
aes
algorithm-design
multiple-encryption
AES: a question about dual ciphers and security
aes
cryptanalysis
algorithm-design
side-channel-attack
Kerckhoffs’ principles – Why should I make my cipher public?
cryptanalysis
protocol-design
algorithm-design
terminology
Security of AES under modification of Sboxes and/or MDS mixing layer
encryption
aes
algorithm-design
Permutation using cryptography instead of Fisher-Yates
aes
algorithm-design
random-number-generator
format-preserving
How do we know a cryptographic primitive won't fail suddenly?
algorithm-design
Is there an encryption algorithm with a key that can only be used to decrypt?
public-key
algorithm-design
Using non-standard constants for SHA-256
hash
algorithm-design
sha-256
sha-2
constants
Proof of Disclosure? Is there such a thing?
signature
algorithm-design
secure-storage
Crypto-Compression Algorithms?
encryption
algorithm-design
compression
(AES in mind) How can we show two irreducible polynomials have a bit-wise linear isomorphism
aes
algorithm-design
finite-field
If we use another irreducible polynomial for AES how can we show it is still resistant to DCA and LCA?
aes
algorithm-design
linear-cryptanalysis
differential-analysis
How to transform a text into numbers in the shortest way possible?
encryption
algorithm-design
How to combine AES-CMACs
signature
algorithm-design
cmac
What's a cryptographic primitive, really?
algorithm-design
terminology
Cryptography math requirements
algorithm-design
What are recommended, general strategies to start block-cipher design and/or analysis?
cryptanalysis
block-cipher
algorithm-design
An unbreakable book cipher?
encryption
algorithm-design
classical-cipher
history
Is encryption possible without secure random numbers?
algorithm-design
linkable tokens
algorithm-design
protocol-design
Is it possible to attack RSA with a WalkSat derivative?
rsa
algorithm-design
factoring
How can an amateur introduce a cryptographic algorithm?
algorithm-design
Confusion and Diffusion in the AES functions
aes
block-cipher
algorithm-design
rijndael
diffusion
Does a two-way fixed-length hash function exist?
encryption
hash
algorithm-design
Primitive polynomials and irreducible polynomials?
algorithm-design
Which precautions to protect against side-channel attacks on ARX ciphers?
encryption
cryptanalysis
algorithm-design
side-channel-attack
arx
What are the "natural language input messages" that were used to derive Streebog's constants?
hash
algorithm-design
Why are the right halves kept unchanged in Feistel networks?
encryption
algorithm-design
des
feistel-network
In a Feistel cipher structure, what exactly does the "round function $F$" do?
block-cipher
algorithm-design
feistel-network
What would be the most efficient way to find two large (2048bit) integers $k$ and $q$ such that $p = kq + 1$ is prime and so is $q$?
encryption
public-key
algorithm-design
keys
Is $a b + e \mod P$ hard to invert?
cryptanalysis
algorithm-design
hardness-assumptions
Does the prime modulus have to be bigger that the generator?
algorithm-design
diffie-hellman
modular-arithmetic
Simple compression functions an sponge functions for educational purposes
algorithm-design
merkle-damgaard
sponge
education
Key vs Algorithm when applied to Enigma
algorithm-design
keys
enigma
Getting the Encryption Function From the Decryption Function + Decryption Key + Encrypted Item
encryption
public-key
algorithm-design
symmetric
Online attendance system
algorithm-design
implementation
Antshares (NEO) algorithm (dbft) - Vulnerability to attacks - Game theory
algorithm-design
A novel encryption method using only a (huge) lookup table. Is this remotely secure?
encryption
algorithm-design
feistel-network
pseudo-random-permutation
Effective security of block cipher – equal the key size, or half the key size?
block-cipher
algorithm-design
symmetric
key-size
security-definition
Skein state size advantages
hash
algorithm-design
skein
Is there a way of increasing the time to brute force a cipher, but by increasing the ciphertext size instead of the key size?
algorithm-design
key-size
What is the purpose of the middle-man actor in chaffing and winnowing?
algorithm-design
Just how surjective is a cryptographic hash like SHA-1?
hash
algorithm-design
Cryptographic Tagging of Information over an Insecure Channel
public-key
algorithm-design
provable-security
Double-CBC as AES-KW Substitute?
algorithm-design
modes-of-operation
key-wrap
Math to replace s-boxes - Good or bad idea?
algorithm-design
s-boxes
Alternatives to sbox's for diffusion?
encryption
algorithm-design
s-boxes
spn
diffusion
How do fast multiplication algorithms deal with cryptanalysis?
encryption
cryptanalysis
algorithm-design
Can we widen hash functions with concatenation?
hash
algorithm-design
Pollard's kangaroo attack on Elliptic Curve Groups
elliptic-curves
algorithm-design
discrete-logarithm
Understanding an encryption technique algorithm
encryption
algorithm-design
keys
FHMQV-C \sigma calculation - Full Dual Exponential Challenge Response (FDCR) signature schemes-
algorithm-design
keys
key-exchange
key-derivation
secret-sharing
Key generation algorithm based on bytes in a drive
algorithm-design
keys
Average number of multiplications in left-to-right k-ary exponentiation
algorithm-design
complexity
Looking for the inverse of the following equation
algorithm-design
xor
Want to generate numeric coupon codes?
encryption
algorithm-design
format-preserving
Difference between stream cipher and block cipher
encryption
block-cipher
algorithm-design
stream-cipher
Post-Quantum Object Sizes.
algorithm-design
entropy
post-quantum-cryptography
Abstracting primitives and modes of operation
hash
modes-of-operation
algorithm-design
Usefulness of Damgård–Jurik
encryption
public-key
algorithm-design
paillier
Proof for the SHA3 claim that 256 bit security is "post-quantum sufficient"?
hash
cryptanalysis
algorithm-design
post-quantum-cryptography
sha-3
How to prove security of a randomized encryption algorithm?
encryption
public-key
cryptanalysis
algorithm-design
Does pairings based cryptography inherently require a CRS/trusted setup?
algorithm-design
pairings
group-theory
DRM simple clone
algorithm-design
protocol-design
tokenization
Is there a standard, or widely accepted convention, for magic constants in crypto software?
algorithm-design
constants
What's the difference between word-oriented and byte-oriented ciphers?
encryption
algorithm-design
terminology
Secret Sharing Scheme with variable share size?
algorithm-design
secret-sharing
Is building your own inefficient but secure cipher hard?
cryptanalysis
block-cipher
algorithm-design
Are there any applications of Lie algebras or Lie groups in cryptography?
algorithm-design
AES parameters specifications
algorithm-design
Full diffusion or Partial diffusion between s-box applications?
aes
algorithm-design
s-boxes
diffusion