1. How trivial is it to derive a private key from two public keys?

  2. Secondary private key that produces limited certificates
  3. Constructing public key encryption schemes with desired ciphertext expansion
  4. ElGamal encryption and signature using same keys
  5. How to cipher with N public keys and decipher with ANY of the N private keys?

  6. Is there a way to double the size of ciphertexts of a public-key scheme which is IND-CCA2
  7. Verification using recovered public key from ECDSA signature and normal verification: what are the differences?
  8. RSA private key d knowing e,n
  9. What is the malicious potential of a key-substitution-attack?

  10. Public Key Encryption, how do you handle not trusting the middle man?
  11. Internet connection encryption through a web server (not VPN/SSH)
  12. UOV signature scheme, how does the affine transformation work? What does the composition of the core map and the affine map yield?
  13. Emulate multisignature wallet
  14. Elligator based on TweetNaCl

  15. Understanding how to use RSA and AES in S/MIME

  16. Understanding WannaCrypt's hybrid encryption scheme
  17. Request for list of Public Key Cryptography Primitives
  18. Lattice Reduction Method to solve multivariate equation
  19. DSA signature computation

  20. Using NewHope key exchange between browser and BouncyCastle implementation

  21. Authorizing someone to open Alice's lock when Alice's lock only has Alice's public key

  22. Broadcast encryption not using symmetric keys
  23. How can we authenticate a public key with limited secure side channel?
  24. Long term Public keys Vs Long term Secret key (LTPK vs LTSK)

  25. What is the benefit of zero knowledge identification (Fiat Shamir) over a standard digital signature?

  26. What is an example of asymmetric cryptography?

  27. how to encrypt the chat message with multiple people public key together and restore the message?

  28. How can SSL secure a two-way communication with only one key-pair?

  29. Curve25519 simple key exchange approach

  30. Can or can not D-Wave's quantum computers use Shor's and Grover's Algorithm to find encryption keys? Why?

  31. Fast decryption, asymmetric or symmetric
  32. Is it possible to implement the Signal Protocol without a server?

  33. How much information of the length of a plaintext can an adversary get from its ciphertext?

  34. Is MAC required with Sign-then-Encrypt?

  35. Group signatures, security and ECDSA

  36. relationship between equivalent ways of computing RSA private key

  37. Basic attacks on McEliece; finding S and P

  38. encrypytion schemes which commute under self-composition
  39. Is there a lower cost cryptography than elliptic-curves based cryptography?

  40. public encryption / message verification algorithm with efficient decryption
  41. Generation of strong primes
  42. Efficient hardware implementation of real-time asymmetric video encryption

  43. Reversing RSA to find $d$

  44. Distributed key generation + signature scheme?
  45. Can messages be recovered from signatures if the private key is known?

  46. Digital signatures with one-way function, can messages be longer than the signature?

  47. How does RSA public and private key structure look like?

  48. $c = d \oplus (f(d)\parallel p)$, solve for $d$ and $p$, how many solutions could you find?

  49. Deterministically generate a RSA public/private key pair from a passphrase (with sufficient entropy)?

  50. How to prove that a hash or an encrypted message was obtained from a plaintext that has a certain pattern?
  51. CSPRNG generation vs asymmetric encryption performance

  52. If a private key decrypts what its public key encrypts, can the public key conversely decrypt what its private key encrypts?
  53. Keyspace of asymmetric ciphers. (RSA)
  54. Alternative Hard Problem to Prime Factorization?

  55. Key derivation of public key without knowledge of private key

  56. Role of long-term asymmetric keys in a forward secrecy instant messaging protocol?
  57. Explaining RSA to non-scientists
  58. Encryption design for user data with service access

  59. Impacts of not using RSA exponent of 65537

  60. RSA re-encryption scheme
  61. Multiple Keys for an Encrypted Secret

  62. Why is RSA considered safe?
  63. Encrypt data between unsafe API

  64. Can a server's ECDSA fingerprint be spoofed during SSH?

  65. Why is Diffie Hellman used alongside public keys?

  66. should one worry about timing attacks with signature verification?

  67. ECC/libSodium: encrypt or decrypt using the private key and decrypt using the public key

  68. Modular Inverse as a Problem
  69. How does Naver Line PC client obtain private key for end-to-end encryption (letter-sealing)?

  70. How did someone discover N, order of G for SECP256k1?

  71. ElGamal: Multiplicative cyclic group and key generation

  72. Calculating private keys in the RSA cryptosystem

  73. WhatsApp end-to-end encryption

  74. Diffie Hellman: Why is $(\mathbb{Z}_{8191}^*, \times)$ an insecure group?
  75. Is it Possible to Generate a Duplicate DH Session Key from 2 Pairs of DH Keys?
  76. Digital signature certificate limited validity period
  77. BLS aggregate signatures for relay node non-interactive incentive accounting

  78. Division of a number in Paillier encrytion which yields decimal result

  79. Does a strong dynamic accumulator exist yet?
  80. Public key homomorphic encryption based on secret key homomorphic

  81. Best method to achieve authenticated encryption with openssl

  82. Is it impossible to have a decentralized service using email addresses as login?

  83. Java recover the public key by only having the privatekey possible?

  84. (Impossibility of?) Associative Pseudorandom Permutation
  85. When is the public ECC key generated?

  86. one-NAD-SIM to many-NAD-SIM for public key encryption

  87. The strength of ECDH public keys with small order
  88. Different ways for modular exponentiation $A^E$ with negative A's

  89. Ring Signature Verification
  90. Is my AES-128-CTR implementation secure enough to encrypt private keys and mnemonic seed?

  91. How to anonymously transfer ownership where sender cannot resend

  92. Key Generation Key
  93. Can you decrypt all messages if a private key is obtained of one of the two entities in asymmetric encryption?

  94. Can the precompiles in Ethereum Byzantium for pairings be used for implementation of BLS verification?

  95. Using digital signature to encrypt/decrypt a text: did I get it right?

  96. limits of homomorphic computing

  97. Diffie-Hellman coloured abstraction
  98. Why aren't there function based discrete log problems?

  99. Is the garbled circuit adaptive?

  100. Significance of Extended Euclidean Algorithm in Cryptography