Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Cryptography Factorization algorithm (crypto.stackexchange.com)
1 point by e-sushi on Dec 13, 2016 | past
Recovering p,qp,q given e,d,Ne,d,N in RSA (crypto.stackexchange.com)
2 points by e-sushi on Dec 13, 2016 | past
How can data be encrypted so only clients can read it? (crypto.stackexchange.com)
1 point by e-sushi on Dec 13, 2016 | past
What is the G function of FIPS-186-2? (crypto.stackexchange.com)
1 point by e-sushi on Dec 13, 2016 | past
Why is it not possible to increase the size of RSA keys indefinitely? (crypto.stackexchange.com)
2 points by e-sushi on Dec 13, 2016 | past
Does the Balloon hashing paper deprecate Argon2? (crypto.stackexchange.com)
2 points by fovc on Nov 25, 2016 | past
Why can't I reverse a hash to a possible input? (crypto.stackexchange.com)
1 point by e-sushi on Nov 24, 2016 | past
What is straight line black box reduction? (crypto.stackexchange.com)
1 point by e-sushi on Nov 17, 2016 | past
What is so special about elliptic curves? (crypto.stackexchange.com)
3 points by e-sushi on Nov 13, 2016 | past
How difficult is it to practically detect a forgery in a cryptosystem? (crypto.stackexchange.com)
1 point by e-sushi on Nov 8, 2016 | past
Truncated 60 bit SHA1 collision detection – brute-forcing issues (crypto.stackexchange.com)
3 points by e-sushi on Oct 31, 2016 | past
Is there an upper limit to plaintext size in Salsa20? (crypto.stackexchange.com)
2 points by e-sushi on Oct 30, 2016 | past
What does a real quantum computer need for cryptanalysis and/or attack purposes? (crypto.stackexchange.com)
1 point by e-sushi on Oct 22, 2016 | past
Vigenère cipher with sha512 and a little foresight turn into a safe one-time pad? (crypto.stackexchange.com)
2 points by e-sushi on Oct 7, 2016 | past | 1 comment
Is Curve25519-java secure? (crypto.stackexchange.com)
1 point by e-sushi on Oct 5, 2016 | past
Is TLS secure against VM reset attacks? (crypto.stackexchange.com)
2 points by e-sushi on Oct 5, 2016 | past
Is it OK to use a hash of the key as nonce for AES GCM? (crypto.stackexchange.com)
2 points by e-sushi on Oct 5, 2016 | past
What Is the Purpose of the “Explicit Nonce” in TLS for AES-GCM and AES-CCM? (crypto.stackexchange.com)
1 point by e-sushi on Oct 5, 2016 | past
Is the SHA1 Hash of MD5 Hash of a Password Secure? – Cryptography Stack Exchange (crypto.stackexchange.com)
4 points by e-sushi on Oct 2, 2016 | past
Are PGP and GPG 100% compatible in all use cases? (crypto.stackexchange.com)
2 points by e-sushi on Sept 20, 2016 | past
Does any operating system offer full system encryption, including RAM and SWAP? (crypto.stackexchange.com)
2 points by e-sushi on Sept 15, 2016 | past
Recommended, general strategies to start block-cipher design and/or analysis (crypto.stackexchange.com)
1 point by e-sushi on Sept 7, 2016 | past
Memory-hard proof-of-work: are they ASIC-resistant? (crypto.stackexchange.com)
1 point by e-sushi on Sept 5, 2016 | past
Algorithm design – Can we exchange the permutation of a sponge construction? (crypto.stackexchange.com)
1 point by e-sushi on Sept 4, 2016 | past
How to encrypt-then-MAC using pen-and-paper and a Caesar cipher? (crypto.stackexchange.com)
1 point by e-sushi on Sept 4, 2016 | past
Multiple users getting access to same secret encryption key on single computer? (crypto.stackexchange.com)
2 points by e-sushi on Aug 31, 2016 | past
Can we exchange the permutation of a sponge construction? (crypto.stackexchange.com)
2 points by e-sushi on July 29, 2016 | past
Why is H(k||x) not a secure MAC construction? (crypto.stackexchange.com)
4 points by e-sushi on July 29, 2016 | past
Do the Syllae algorithm and Malaysian cipher from Rubicon exist? (crypto.stackexchange.com)
1 point by e-sushi on July 26, 2016 | past
How do ciphers (like RSA) change plaintext into numeric digits for computing? (crypto.stackexchange.com)
2 points by e-sushi on July 21, 2016 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: