<we><edit> <!-- questions and answers -->
signature
modular-arithmetic
sha-3
entropy
tls
pgp
password-based-encryption
ecb
one-way-function
encryption
known-plaintext-attack
classical-cipher
zero-knowledge-proofs
performance
preimage-resistance
cbc
protocol-analysis
gcm
protocol-design
elliptic-curves
random-number-generator
elgamal-encryption
pairings
terminology
factoring
signature
Is there a standard padding/format for RSA Blind Signatures?
rsa
signature
reference-request
blind-signature
Example of existentially unforgeable and identity of the signer
signature
What is the advantage of digital signatures over message authentication codes?
signature
mac
Most Compact Secure Post-Quantum Signatures and Public Keys?
public-key
signature
post-quantum-cryptography
Signature for Identity Verificaton on "offline" P2P network
public-key
signature
What is an approximate length for a digital signature (SHA) in this case?
signature
sha-2
Is there a cryptographic solution to provide a “proof of exclusion”?
signature
zero-knowledge-proofs
Digital Signature Algorithm signature creation?
public-key
signature
dsa
how to validate cert when signed cert has authority key id but signing cert doesn't?
signature
tls
openssl
certificates
Should I be using PKCS1 v1.5 or PSS for RSA signatures?
rsa
signature
pkcs1
rsa-pss
How robust is RSA-FDH against distribution bias?
hash
signature
Knowing you can combine 2 signatures, Is it possible to remove part of the signature?
signature
forgery
Given 2 Digital Signature generated by $S=D\times k^r$ how do you solve for $k$?
signature
elgamal-signature
Distributed key generation + signature scheme?
public-key
signature
In HMQV, can one use multiple identities with one public key?
signature
diffie-hellman
protocol-analysis
sign data and append certificate VS sign data and certificate
rsa
signature
certificates
pki
How can we know who sent a MAC-then-encrypt message?
encryption
signature
mac
What type of attacks are practical for this situation?
signature
forgery
Is there a complete list of Signature Algorithm names?
signature
openssl
certificates
Verifiable computation on signed data
signature
verifiability
Can the precompiles in Ethereum Byzantium for pairings be used for implementation of BLS verification?
public-key
signature
pairings
bls-signature
Ring Signature Verification
public-key
signature
Reasons for Chinese SM2 Digital Signature Algorithm
signature
elliptic-curves
dsa
Is the SHA-family of hash functions surjective onto their domain with each element equally likely?
hash
signature
algorithm-design
authentication
How to calculate Bilinear Map?
signature
diffie-hellman
finite-field
What are the different uses of MAC and Digital Signature?
signature
authentication
hmac
mac
integrity
Is it possible to derive an Ed25519-public-key from an Ed25519-signature?
signature
ed25519
anonymity
How should I incrementally sign a large set of documents?
hash
signature
collision-resistance
What hashing algorithm does RSA use?
rsa
signature
What is gpg2 algo 1 and 8 concerning its signature-procedure?
rsa
signature
algorithm
Rivest's ring signatures with hashes instead of symmetric encryption
public-key
signature
authentication
What is customizable in ECDSA signature and verification?
elliptic-curves
signature
dsa
Can we use a signature of a message as an decryption key?
signature
How digital signatures work
signature
Possible Digital Signature Hack?
public-key
signature
attack
Advantages of using intermediate hash over full hash in digital signature application
hash
signature
How use multiple keys to sign the same document?
signature
ed25519
Winternitz hash based signature signing and verification
hash
signature
hash-signature
Example use case of signature using RSA
rsa
signature
Signature using RSA (as described in Cryptography engineering)
rsa
signature
Linkable Ring Signatures on Pairing-Friendly curves
signature
pairings
ElGamal signature: Forging a signature of a specific form
signature
elgamal-signature
forgery
What is the high level procedure to use ECDSA?
elliptic-curves
signature
Ring Signature - paper/code difference in trying to solve inverse trap door function?
rsa
public-key
signature
Proof of Disclosure? Is there such a thing?
signature
algorithm-design
secure-storage
Would the public key of Digital Signature be replaced?
signature
Is OpenPGP used for purposes other than e-mail encryption and signing?
encryption
signature
pgp
What exactly is a digital signature?
rsa
public-key
signature
How to combine AES-CMACs
signature
algorithm-design
cmac
What's the minimum message expansion for Digital Signature?
signature
Is it safe to include the public certificate in xml digital signatures?
public-key
signature
certificates
Asymmetric code signing also tied to a device
signature
What is the Discrete Logarithm Problem in (Z/Zp) in the DSA?
public-key
signature
discrete-logarithm
dsa
Why is a CSR signed and which key is used for signing?
signature
certificates
Why don't crypto-currencies use the Lamport signature scheme?
signature
hash-signature
bitcoin
Is the RSA signature attack from Desmedt and Odlyzko practical?
rsa
signature
attack
Does this ECIES scheme make MAC redundant?
signature
mac
implementation
poly1305
ecies
Why can't you hijack someone's public key
elliptic-curves
signature
bitcoin
Security of RSA signature using PKCS 1.5
rsa
signature
padding
pkcs1
rsa-pss
Why do we need to compute message digest of a message first while signing it?
hash
signature
hash-signature
How to strongly reference a file that is signed twice (counter signed)
signature
hash-signature
Key and signature sizes of NTRU and NTRU Prime?
signature
key-size
ntru
Can we use higher strength SHA along with lower strength RSA key in SSL?
rsa
signature
tls
sha-256
openssl
RSA-PSS salt size
rsa
signature
In EC with key chaining, is it possible to verify signature made by root private key using public key of derived keypair?
elliptic-curves
signature
What is the difference between signatures and VRF?
signature
hash-signature
verifiability
How should ECDSA handle the null hash?
elliptic-curves
signature
dsa
Schnorr signatures: multisignature support
elliptic-curves
signature
schnorr-signature
Checking a file for integrity and authentication
hash
signature
authentication
integrity
Is allowing both digitalSignature and keyEncipherment certificate usages a bad practice?
encryption
rsa
signature
certificates
Using RSA signature as a secret material
rsa
signature
pkcs1
Is RSA signature as strong as the RSA encryption?
encryption
rsa
signature
Bruce Schneier, encryption, public keys and digital-signature.
encryption
public-key
signature
The parameters included in TLS 1.2 server signature in the ServerKeyExchange
hash
signature
protocol-design
tls
Is it possible to have a PAdES signature with only a timestamp?
signature
timestamping
pades
Rotatable hash-based duplicate check
hash
signature
hmac
hash-signature
Tamper-proofing log files
hash
rsa
signature
authenticated-encryption
file-encryption
Remotely Verify File Timestamp
signature
timestamping
Are there any examples of signature schemes with multiple signing keys but one verification key?
signature
DSS security in comparison to ECDSA or RSA
signature
tls
openssl
ciphersuite
Selective Forgery of a Digital Signature - Goldwasser et al
signature
chosen-plaintext-attack
forgery
Schnorr Digital Signature
elliptic-curves
signature
schnorr-signature
How CL-signature can act as positive & additive accumulator?
signature
anonymity
accumulators
Negotiate a secure connection without certificates?
encryption
rsa
public-key
signature
man-in-the-middle
Public-key format for ECDSA as in FIPS 186-4?
elliptic-curves
signature
reference-request
dsa
file-format
Using cryptography: How to handle this real life situation?
signature
Choice of bilinear group for implementation of BLS signature with NIWI proof?
signature
pairings
anonymity
unlinkability
multi-theorem vs single-theorem for non-interactive zero knowledge
signature
zero-knowledge-proofs
Proving Authenticity in Attribute Based Encryption
signature
authentication
abe
Which curve is used for ECDH
rsa
signature
Is this schema secure?
rsa
signature
blind-signature
Is there a way to verify an original author using encryption?
signature
verifiability
Minimizing size of signed message with discrete-log scheme
signature
discrete-logarithm
message-recovery
Is it bad to expose the public key?
hash
public-key
signature
ed25519
DSA security improvement without increasing signature size
signature
discrete-logarithm
dsa
which exponent to be used for RSA e =3 or 65537 for RSASSAPSS signature verification
rsa
signature
rsa-pss
Zero-knowledge signature verification
signature
zero-knowledge-proofs
Are there any practical implementation of a homomorphic hashing or signature scheme?
hash
signature
Why do we need a digital signature?
hash
public-key
signature
pki
Signing an exchanged symmetric key that is asymmetrically encrypted
public-key
signature
protocol-design
symmetric
key-exchange