| | Cryptography Factorization algorithm (crypto.stackexchange.com) |
| 1 point by e-sushi on Dec 13, 2016 | past |
|
| | Recovering p,qp,q given e,d,Ne,d,N in RSA (crypto.stackexchange.com) |
| 2 points by e-sushi on Dec 13, 2016 | past |
|
| | How can data be encrypted so only clients can read it? (crypto.stackexchange.com) |
| 1 point by e-sushi on Dec 13, 2016 | past |
|
| | What is the G function of FIPS-186-2? (crypto.stackexchange.com) |
| 1 point by e-sushi on Dec 13, 2016 | past |
|
| | Why is it not possible to increase the size of RSA keys indefinitely? (crypto.stackexchange.com) |
| 2 points by e-sushi on Dec 13, 2016 | past |
|
| | Does the Balloon hashing paper deprecate Argon2? (crypto.stackexchange.com) |
| 2 points by fovc on Nov 25, 2016 | past |
|
| | Why can't I reverse a hash to a possible input? (crypto.stackexchange.com) |
| 1 point by e-sushi on Nov 24, 2016 | past |
|
| | What is straight line black box reduction? (crypto.stackexchange.com) |
| 1 point by e-sushi on Nov 17, 2016 | past |
|
| | What is so special about elliptic curves? (crypto.stackexchange.com) |
| 3 points by e-sushi on Nov 13, 2016 | past |
|
| | How difficult is it to practically detect a forgery in a cryptosystem? (crypto.stackexchange.com) |
| 1 point by e-sushi on Nov 8, 2016 | past |
|
| | Truncated 60 bit SHA1 collision detection – brute-forcing issues (crypto.stackexchange.com) |
| 3 points by e-sushi on Oct 31, 2016 | past |
|
| | Is there an upper limit to plaintext size in Salsa20? (crypto.stackexchange.com) |
| 2 points by e-sushi on Oct 30, 2016 | past |
|
| | What does a real quantum computer need for cryptanalysis and/or attack purposes? (crypto.stackexchange.com) |
| 1 point by e-sushi on Oct 22, 2016 | past |
|
| | Vigenère cipher with sha512 and a little foresight turn into a safe one-time pad? (crypto.stackexchange.com) |
| 2 points by e-sushi on Oct 7, 2016 | past | 1 comment |
|
| | Is Curve25519-java secure? (crypto.stackexchange.com) |
| 1 point by e-sushi on Oct 5, 2016 | past |
|
| | Is TLS secure against VM reset attacks? (crypto.stackexchange.com) |
| 2 points by e-sushi on Oct 5, 2016 | past |
|
| | Is it OK to use a hash of the key as nonce for AES GCM? (crypto.stackexchange.com) |
| 2 points by e-sushi on Oct 5, 2016 | past |
|
| | What Is the Purpose of the “Explicit Nonce” in TLS for AES-GCM and AES-CCM? (crypto.stackexchange.com) |
| 1 point by e-sushi on Oct 5, 2016 | past |
|
| | Is the SHA1 Hash of MD5 Hash of a Password Secure? – Cryptography Stack Exchange (crypto.stackexchange.com) |
| 4 points by e-sushi on Oct 2, 2016 | past |
|
| | Are PGP and GPG 100% compatible in all use cases? (crypto.stackexchange.com) |
| 2 points by e-sushi on Sept 20, 2016 | past |
|
| | Does any operating system offer full system encryption, including RAM and SWAP? (crypto.stackexchange.com) |
| 2 points by e-sushi on Sept 15, 2016 | past |
|
| | Recommended, general strategies to start block-cipher design and/or analysis (crypto.stackexchange.com) |
| 1 point by e-sushi on Sept 7, 2016 | past |
|
| | Memory-hard proof-of-work: are they ASIC-resistant? (crypto.stackexchange.com) |
| 1 point by e-sushi on Sept 5, 2016 | past |
|
| | Algorithm design – Can we exchange the permutation of a sponge construction? (crypto.stackexchange.com) |
| 1 point by e-sushi on Sept 4, 2016 | past |
|
| | How to encrypt-then-MAC using pen-and-paper and a Caesar cipher? (crypto.stackexchange.com) |
| 1 point by e-sushi on Sept 4, 2016 | past |
|
| | Multiple users getting access to same secret encryption key on single computer? (crypto.stackexchange.com) |
| 2 points by e-sushi on Aug 31, 2016 | past |
|
| | Can we exchange the permutation of a sponge construction? (crypto.stackexchange.com) |
| 2 points by e-sushi on July 29, 2016 | past |
|
| | Why is H(k||x) not a secure MAC construction? (crypto.stackexchange.com) |
| 4 points by e-sushi on July 29, 2016 | past |
|
| | Do the Syllae algorithm and Malaysian cipher from Rubicon exist? (crypto.stackexchange.com) |
| 1 point by e-sushi on July 26, 2016 | past |
|
| | How do ciphers (like RSA) change plaintext into numeric digits for computing? (crypto.stackexchange.com) |
| 2 points by e-sushi on July 21, 2016 | past |
|
|
| More |