1. Encryption/Decryption Modulo function
  2. Working out what encryption/encoding is being used for these strings
  3. Is there a way of converting 4 letter words in to 4 letter numbers?
  4. Multiple private keys with RSA
  5. Help me - I received a riddle which is too hard

  6. Elliptic Curve Cryptography, decrypting returns false result
  7. Are there any benefits to using ECB over CBC?

  8. Elliptical Curve Cryptography benchmark test
  9. Is there an encryption algorithm that only adds minimal (if any) size compared to the size of the unencrypted data?

  10. What is the benefit of zero knowledge identification (Fiat Shamir) over a standard digital signature?

  11. What is the difference DET-ABE Vs CP-ABE and KP-ABE?
  12. What kind of ciphers does not depend on order of operation?

  13. Can anyone tell me what kind of cipher this is? or how to go about solving the key?
  14. How to measure the security level provided by a fully homomorphic encryption library?

  15. What Cipher Suite in this list is the worst to use
  16. Can an attacker predict value of $d$ if attacker already used $n$ for encryption?
  17. Multi-round Transposition/Playfair as a secure hand cipher in the computer age
  18. How can we encrypt a file to be just readable (and not writable) after decryption?

  19. In Asymmetric cryptography, encryption and decryption functions are based on modulo n
  20. Encryption to perform obfuscation

  21. Rapid partial block decryption of compute intensive full encryption

  22. Is there any symmetric encryption algorithm cannot guess the key when encryption and decryption value are known?
  23. Any algorithm with a pair of master keys and multiple pairs of subkey for a secure key escrow?
  24. Any algorithm with a master key for decrypting private key encrypted messages?

  25. Please Explain PRESENT-80 cipher key update

  26. Where is RSA applied in real life?
  27. A question about abstract algebra

  28. Where is RSA used today in smartphones for data protection?

  29. How to find modulus from a RSA public key?

  30. Looking for a specific cryptosystem (encryption two times with two different keys and then decryption with another different key )

  31. EL gamal cryptosystem
  32. How can I show Aes 512 bit is better than AES 256
  33. Decipher cryptograms encrypted with substitution cipher

  34. Can i make a doc, docx or excel file encrypted by python?
  35. Is using the same IV in AES similar to not using an IV in the first place?
  36. Is zero IV with AES-CBC safe if CPA is not possible and indistinguishability is not an issue?

  37. PGP Encryption and signing

  38. Proving security of AES-512 bit
  39. uniqid(mt_rand(), true);

  40. Secure Cipher Suites supported by JDK versions
  41. Is it enough to encrypt then sign when using symmetric-key encryption?

  42. Brute force encryption keys base on their length

  43. Generating AES-256 Private Key from user string

  44. How do “modes of operation” with block ciphers like (eg) DES work?

  45. How work fully homomorphic encryption to do calculations with encrypted data?
  46. Non partial homomorphic encryption
  47. homomorphic encryption E(x+y)=E(x) . E(y)?

  48. Decrypt the encrypted message with similar symmetric key

  49. Why is the payload size is restricted when using RSA

  50. Revealing vote after time
  51. How do I calculate a password space if the password only has eight alphabetic characters (not case sensitive)
  52. How do I show that the function f is not collision resistant?
  53. OAEPwithMD5andMGF1Padding in node-rsa
  54. cryptographic function that changes with time?

  55. What is the main difference between a key, an IV and a nonce?

  56. Storing RSA private key
  57. Decryption with negligible error

  58. Can a ciphertext be decrypted to 2 meaningful messages?
  59. What values in the SDES algorithm change when we want to Decrypt?
  60. Why was the Navajo code not broken by the Japanese in WWII?
  61. Cracking stream cipher with IV

  62. Searchable Symmetric Encryption VS Deterministic encryption?
  63. Security strength for encryption and authentication (wrapping) of cryptographic keys
  64. AES s-box – How do I calculate the inverse of this field equation?
  65. GCM cipher M0 tables : semantic questions on how to implement GCM

  66. Decryption of a file encrypted by pseudo-random number generator (The Linear Congruence rand()

  67. Security Implications of Multiplication Modulo with a composite

  68. Establish more secure symmetric crypto system given A and B have small initial secret

  69. AES encryption using a Diffie-Hellman question

  70. Understanding how Oscar can decrypt a message in RSA
  71. Can FFT be useful in encryption of dicom images?
  72. Key strenth in Cipher cascades (Veracrypt)
  73. Constructing public key encryption schemes with desired ciphertext expansion

  74. Decrypting message based on plain-text and encrypted text
  75. Secure group chat with large groups

  76. ECIES encryption output with additional parameters
  77. Finding $d$ in RSA Encryption mathematically and by hand
  78. Elliptic curve representation

  79. Does the DES s-box only provide confusion, or does it also provide an avalanche effect?

  80. How cryptographically secure was the original WW2 Enigma machine, from a modern viewpoint?

  81. How to express access structure ( access tree, linear secret sharing , etc.)

  82. Public Key Encryption, how do you handle not trusting the middle man?
  83. Secure Data from physical and logical Theft in a Multi User Environment
  84. Multi User limited Time Encryption of big Datasets
  85. Cryptanalys of "bad" RC4 implementation

  86. Decrypting only message product - is it possible?

  87. How to express access structure (access tree, linear secret sharing, etc.)

  88. Symmetric Multi-Key Decryption

  89. Understanding how to use RSA and AES in S/MIME

  90. How to break a columnar transposition cipher?

  91. Understanding WannaCrypt's hybrid encryption scheme
  92. How to generate a ciphertext independently decodable with multiple keys?

  93. guess keyword of a decoded code
  94. Encryption / Decryption of PCM Audio to Tolerate Resampling

  95. Authorizing someone to open Alice's lock when Alice's lock only has Alice's public key

  96. how to encrypt the chat message with multiple people public key together and restore the message?

  97. How can SSL secure a two-way communication with only one key-pair?
  98. Is multi-byte mapping to one byte a viable encryption technique?

  99. firmware update - 34C3 CTF solution

  100. the counter mode of encryption CTR - AES