1. How safe is end to end encryption?

  2. Is squaring equivalent to shifting in the normal basis representation of an extension field over the prime field?
  3. Crypto-Cannibal-Survivor, Share keys with respect to privacy

  4. Can one claim that AES is a perfect cipher?

  5. What is the main difference between Anonymous HIBE and Anonymous Predicate Encryption?

  6. How can we add real values using GF field?

  7. How to break a columnar transposition cipher?

  8. Can we still verify a RSA signature if the modulus changed
  9. Packet loss, AES and IV's

  10. Cross correlation of two Boolean functions

  11. shuffle data, eliminate duplicate bytes in group bytes

  12. Is there a cryptographic scheme that allows joint encryption using a shared secret?
  13. Attacking a cipher, not knowing what the plaintext should look like – how do you know you’ve successfully decrypted the ciphertext?

  14. Use signed email as method for deriving encryption key

  15. Should data encrypted in a database have a MAC?

  16. Can I construct a feasible stream cipher out of HMAC and a secure hash algorithm?

  17. RSA: Detecting period of unconcealed messages

  18. How to find the inverse of f(x) in the NTRU key generation?

  19. What is the best technique I can use to encrypt inner nodes in B+tree?

  20. What are the Evaluation Meassures of Public key cryptography algorithm

  21. How to break combined Vignere and Columnar Transposition Ciphers with different key lengths

  22. Find the encryption method with 4 encrypted and decrypted message

  23. How can I calculate non-linearity of an s-box element wise?

  24. Is it possible to assume that the adversary is not allowed to make an all zero plaintext query in IND-CPA?
  25. What is the difference between Argon2d and Argon2i?
  26. Polyalphabetic cipher

  27. What is the special property that an Abelian group must satisfy that a non-Abelian group does not need to satisfy?

  28. Ture or false: using session keys via key establishment using a distribution center protects against passive attacks

  29. What's the Ord(4) in $\mathbb{Z}^∗_{15}$?

  30. What are the elements of the multiplicative group $\mathbb Z^{*}_{15}$?
  31. Security properties of an encryption scheme built from a PRP and a PRG

  32. Сryptanalysis of Hill's method

  33. Avalanche effect in DES

  34. mnar Transposition Cipher and then One-Time-Pad cipher?

  35. Feistel cipher on Cipher Block Chaining
  36. Is there a mental poker algorithm that does not rely on commutative encryption?

  37. stream cipher self_synchronizing
  38. is LFSR secure or not? what type of attacker it?

  39. What if we increase the key length of DES and use ECB Mode, then will we get the different output as ECB mode encrypt with the same key?

  40. What is the best way to encrypt form data from client end javascript and decrypt at server side Java?

  41. Advanced Encryption Standard - MixColumn
  42. how to obtain the plaintext in counter mode using the AES block cipher
  43. Question on recovering a key in the algorithm
  44. Is there a way to bruteforce the private key of this cryptocurrency altcoin?
  45. Using ECB as RSA encryption mode when encrypted messages are unique?

  46. Authentication of machine before installation (to stop piracy)

  47. Should the identity of a sender be verified using additional means, or does a MAC suffice?
  48. Different patterns of different paterns, wildcard
  49. Explain the mathematical definition of a cryptosystem using words
  50. Known plaintext attack without knowing the location of the plaintext
  51. Calculating power consumption by a cipher program

  52. Can compression + encryption sometimes be beneficial?

  53. Does the output of a cipher have to be no longer than the input?

  54. Is it possible to make time-locked encrytion algorithm?

  55. Is AES-256 consistent?
  56. Creating multiple independent keys for cascading - recommended approach?

  57. Has any alternative to RSA and Discrete Logarithm been standardized for deployment?
  58. Security of additive symmetric homomorphic encryption scheme with linear operations?

  59. Lightweight crypto algorithm

  60. Semantic security IND-CPA of Affine Hill Cipher

  61. How should the length field be handled in a cipher?
  62. simple encrypt/decrypt

  63. Is there any cipher standard based on SHA-3, where it is not used as part of RFC2104?
  64. How can we know who sent a MAC-then-encrypt message?

  65. AES with small and large string keys
  66. Block cipher's output in case of uniformly drawn input
  67. Seekable cipher, is AES CTR a good solution?
  68. How secure is AES-256?

  69. Why should the factors $p,q$ of $n$ be half the bit length of $n$ in RSA?
  70. How to encrypt data with the Threefish cipher

  71. Determining key size in bits by knowing plaintext and ciphertext

  72. Required inputs for generating Sk in Functional Encryption
  73. How does Signal Messenger's Safety Number Works?
  74. AES-192 bit fixed matrix values in mixed column step

  75. How secure is a client-side javascript encrypter?

  76. Key strenth in Cipher cascades (Veracrypt)

  77. What do we need white box crypto for?
  78. How to encrypt a 192 bit plaintext using AES-192?

  79. Cracking pdf file with arabic password using hashcat
  80. Possible data leak when duplicating encryption?

  81. Why for a secure RSA the difference of | p - q | should not be too small?

  82. Partially Homomorphic Cryptographic Schemes - Deterministic vs Probabilistic
  83. Distinct cleartexts that are invariant under encryption
  84. attribute based encryption [encryption function]
  85. Single Message Security - Modified PRF based SKE

  86. Can a CSPRNG, seeded with a key, be used to generate a byte sequence as long as the plaintext to XOR it with that?
  87. In a AES-CBC + HMAC architecture, Is it secure to send a second IV in a message to a device incapable of producing satisfactory random numbers?
  88. Quantative criteria to measure confusion and diffusion property of encryption algorithm

  89. How can a layman create a simple cypher to encrypt text?
  90. How little linearity can someone get away with for symmetric encryption-decryption?
  91. could a block cipher be used in R-CTR to compute a MAC

  92. Please help a complete noob with deniable encryption!

  93. Is it possible to add error propagation to OTP?

  94. Feistel cipher key generation and round function algorithms

  95. What is the difference between Columnar and Grid Transposition?
  96. Changing password hash and iv on (successful) user login
  97. How should k2 be produced in the RC4A stream cipher (A modification of RC4)?
  98. Why Rejewski advanced three position for the right rotor in the second set of rotors in the Cyclometer he devised?

  99. Need of Image Encryption

  100. When will AES be "upgraded"?