<we><edit> <!-- questions and answers -->
discrete-logarithm
ed25519
attack
cbc-mac
random-number-generator
ctr
pseudo-random-function
secret-sharing
pseudo-random-permutation
des
rsa
openssl
reference-request
gcm
authenticated-encryption
file-encryption
finite-field
sha-2
side-channel-attack
protocol-analysis
integrity
brute-force-attack
public-key
keys
substitution-cipher
public-key
How trivial is it to derive a private key from two public keys?
public-key
dsa
Secondary private key that produces limited certificates
public-key
Constructing public key encryption schemes with desired ciphertext expansion
encryption
public-key
ElGamal encryption and signature using same keys
public-key
elgamal-encryption
elgamal-signature
How to cipher with N public keys and decipher with ANY of the N private keys?
public-key
multiparty-computation
Is there a way to double the size of ciphertexts of a public-key scheme which is IND-CCA2
public-key
provable-security
chosen-ciphertext-attack
Verification using recovered public key from ECDSA signature and normal verification: what are the differences?
public-key
elliptic-curves
signature
RSA private key d knowing e,n
rsa
public-key
What is the malicious potential of a key-substitution-attack?
public-key
signature
attack
Public Key Encryption, how do you handle not trusting the middle man?
encryption
hash
public-key
Internet connection encryption through a web server (not VPN/SSH)
encryption
public-key
keys
anonymity
data-privacy
UOV signature scheme, how does the affine transformation work? What does the composition of the core map and the affine map yield?
public-key
cryptanalysis
post-quantum-cryptography
matrix-multiplication
Emulate multisignature wallet
public-key
Elligator based on TweetNaCl
public-key
Understanding how to use RSA and AES in S/MIME
encryption
rsa
aes
public-key
s-mime
Understanding WannaCrypt's hybrid encryption scheme
encryption
rsa
aes
public-key
Request for list of Public Key Cryptography Primitives
public-key
Lattice Reduction Method to solve multivariate equation
public-key
lattice-crypto
DSA signature computation
public-key
signature
dsa
Using NewHope key exchange between browser and BouncyCastle implementation
public-key
key-exchange
post-quantum-cryptography
Authorizing someone to open Alice's lock when Alice's lock only has Alice's public key
encryption
public-key
authenticated-encryption
password-based-encryption
Broadcast encryption not using symmetric keys
public-key
symmetric
How can we authenticate a public key with limited secure side channel?
public-key
collision-resistance
Long term Public keys Vs Long term Secret key (LTPK vs LTSK)
public-key
secret-sharing
What is the benefit of zero knowledge identification (Fiat Shamir) over a standard digital signature?
encryption
public-key
authentication
zero-knowledge-proofs
fiat-shamir
What is an example of asymmetric cryptography?
public-key
how to encrypt the chat message with multiple people public key together and restore the message?
encryption
public-key
How can SSL secure a two-way communication with only one key-pair?
encryption
tls
public-key
keys
Curve25519 simple key exchange approach
public-key
elliptic-curves
key-exchange
Can or can not D-Wave's quantum computers use Shor's and Grover's Algorithm to find encryption keys? Why?
rsa
public-key
post-quantum-cryptography
Fast decryption, asymmetric or symmetric
public-key
symmetric
Is it possible to implement the Signal Protocol without a server?
public-key
forward-secrecy
How much information of the length of a plaintext can an adversary get from its ciphertext?
public-key
provable-security
Is MAC required with Sign-then-Encrypt?
encryption
public-key
signature
mac
Group signatures, security and ECDSA
rsa
public-key
elliptic-curves
dsa
relationship between equivalent ways of computing RSA private key
rsa
public-key
Basic attacks on McEliece; finding S and P
public-key
cryptanalysis
post-quantum-cryptography
mceliece
attack
encrypytion schemes which commute under self-composition
encryption
public-key
commutative-encryption
Is there a lower cost cryptography than elliptic-curves based cryptography?
rsa
public-key
elliptic-curves
lightweight
public encryption / message verification algorithm with efficient decryption
public-key
Generation of strong primes
rsa
public-key
prime-numbers
Efficient hardware implementation of real-time asymmetric video encryption
encryption
public-key
Reversing RSA to find $d$
encryption
rsa
public-key
modular-arithmetic
Distributed key generation + signature scheme?
public-key
signature
Can messages be recovered from signatures if the private key is known?
public-key
signature
Digital signatures with one-way function, can messages be longer than the signature?
public-key
signature
hash-signature
How does RSA public and private key structure look like?
rsa
public-key
$c = d \oplus (f(d)\parallel p)$, solve for $d$ and $p$, how many solutions could you find?
public-key
symmetric
Deterministically generate a RSA public/private key pair from a passphrase (with sufficient entropy)?
rsa
public-key
key-derivation
How to prove that a hash or an encrypted message was obtained from a plaintext that has a certain pattern?
hash
public-key
CSPRNG generation vs asymmetric encryption performance
public-key
random-number-generator
If a private key decrypts what its public key encrypts, can the public key conversely decrypt what its private key encrypts?
public-key
Keyspace of asymmetric ciphers. (RSA)
rsa
public-key
Alternative Hard Problem to Prime Factorization?
public-key
symmetric
factoring
number-theory
Key derivation of public key without knowledge of private key
authentication
public-key
Role of long-term asymmetric keys in a forward secrecy instant messaging protocol?
public-key
diffie-hellman
forward-secrecy
Explaining RSA to non-scientists
rsa
public-key
Encryption design for user data with service access
public-key
homomorphic-encryption
Impacts of not using RSA exponent of 65537
public-key
rsa
RSA re-encryption scheme
rsa
public-key
Multiple Keys for an Encrypted Secret
encryption
public-key
keys
Why is RSA considered safe?
encryption
rsa
public-key
algorithm-design
keys
Encrypt data between unsafe API
encryption
public-key
Can a server's ECDSA fingerprint be spoofed during SSH?
public-key
dsa
ssh
Why is Diffie Hellman used alongside public keys?
rsa
public-key
elliptic-curves
should one worry about timing attacks with signature verification?
public-key
signature
dsa
timing-attack
ECC/libSodium: encrypt or decrypt using the private key and decrypt using the public key
public-key
elliptic-curves
signature
ed25519
libsodium
Modular Inverse as a Problem
public-key
How does Naver Line PC client obtain private key for end-to-end encryption (letter-sealing)?
encryption
public-key
tls
How did someone discover N, order of G for SECP256k1?
public-key
elliptic-curves
algorithm-design
ElGamal: Multiplicative cyclic group and key generation
public-key
elgamal-encryption
Calculating private keys in the RSA cryptosystem
public-key
rsa
WhatsApp end-to-end encryption
encryption
public-key
signature
keys
key-exchange
Diffie Hellman: Why is $(\mathbb{Z}_{8191}^*, \times)$ an insecure group?
public-key
diffie-hellman
Is it Possible to Generate a Duplicate DH Session Key from 2 Pairs of DH Keys?
public-key
diffie-hellman
attack
man-in-the-middle
Digital signature certificate limited validity period
public-key
signature
tls
timestamping
BLS aggregate signatures for relay node non-interactive incentive accounting
hash
public-key
schnorr-signature
bls-signature
Division of a number in Paillier encrytion which yields decimal result
public-key
homomorphic-encryption
number-theory
paillier
Does a strong dynamic accumulator exist yet?
public-key
accumulators
Public key homomorphic encryption based on secret key homomorphic
public-key
homomorphic-encryption
Best method to achieve authenticated encryption with openssl
encryption
public-key
symmetric
openssl
Is it impossible to have a decentralized service using email addresses as login?
public-key
man-in-the-middle
Java recover the public key by only having the privatekey possible?
public-key
(Impossibility of?) Associative Pseudorandom Permutation
public-key
pseudo-random-permutation
algebraic-attack
When is the public ECC key generated?
public-key
elliptic-curves
keys
one-NAD-SIM to many-NAD-SIM for public key encryption
public-key
The strength of ECDH public keys with small order
public-key
elliptic-curves
diffie-hellman
brute-force-attack
Different ways for modular exponentiation $A^E$ with negative A's
rsa
public-key
modular-arithmetic
Ring Signature Verification
public-key
signature
Is my AES-128-CTR implementation secure enough to encrypt private keys and mnemonic seed?
aes
public-key
ctr
cryptocurrency
How to anonymously transfer ownership where sender cannot resend
public-key
diffie-hellman
anonymity
Key Generation Key
public-key
Can you decrypt all messages if a private key is obtained of one of the two entities in asymmetric encryption?
encryption
public-key
Can the precompiles in Ethereum Byzantium for pairings be used for implementation of BLS verification?
public-key
signature
pairings
bls-signature
Using digital signature to encrypt/decrypt a text: did I get it right?
public-key
limits of homomorphic computing
encryption
public-key
algorithm-design
homomorphic-encryption
Diffie-Hellman coloured abstraction
public-key
diffie-hellman
Why aren't there function based discrete log problems?
public-key
discrete-logarithm
Is the garbled circuit adaptive?
public-key
Significance of Extended Euclidean Algorithm in Cryptography
public-key