| | What are the implications of the new alleged key recovery attack on SIMON? (crypto.stackexchange.com) |
| 1 point by hsnewman on May 14, 2019 | past |
|
| | Why would anyone choose 3DES over AES in software? (crypto.stackexchange.com) |
| 2 points by based2 on Dec 16, 2018 | past |
|
| | Why is elliptic curve cryptography not widely used, compared to RSA? (crypto.stackexchange.com) |
| 4 points by neduma on Oct 2, 2018 | past | 1 comment |
|
| | How come Public key cryptography wasn't discovered earlier? (crypto.stackexchange.com) |
| 2 points by michaelt on May 29, 2018 | past |
|
| | Is the software that uses PGP broken, or is it PGP itself? (crypto.stackexchange.com) |
| 1 point by WhoppingWeasel on May 17, 2018 | past |
|
| | Free Start Collision in SHA-3 (crypto.stackexchange.com) |
| 1 point by ssataei on Feb 17, 2018 | past |
|
| | Can we prove posession of AES-256 key without showing it? (crypto.stackexchange.com) |
| 1 point by koolba on Feb 17, 2018 | past |
|
| | Why was AES CBC removed in TLS 1.3? (crypto.stackexchange.com) |
| 4 points by Bender on Oct 27, 2017 | past |
|
| | Length Extension Attack (crypto.stackexchange.com) |
| 1 point by vinchuco on Oct 17, 2017 | past |
|
| | How Far Ahead of Academia Are Government Agencies? (crypto.stackexchange.com) |
| 1 point by lainon on Sept 13, 2017 | past |
|
| | Fixed point of the SHA-256 compression function (crypto.stackexchange.com) |
| 2 points by aburan28 on June 27, 2017 | past |
|
| | Would the Intel SHA extensions help in creating SHA1 collisions? (crypto.stackexchange.com) |
| 1 point by yuhong on June 19, 2017 | past |
|
| | Analogue encryption algorithms (crypto.stackexchange.com) |
| 1 point by sr2 on June 9, 2017 | past |
|
| | What exactly is a “garbled circuit”? (crypto.stackexchange.com) |
| 2 points by pizza on March 29, 2017 | past |
|
| | Cryptography Stack Exchange (crypto.stackexchange.com) |
| 3 points by remx on March 5, 2017 | past |
|
| | Using same keypair for Diffie-Hellman and signing (crypto.stackexchange.com) |
| 1 point by wslh on Feb 22, 2017 | past |
|
| | SHA-512 is 1.5x faster than SHA-256 on 64-bit platforms (crypto.stackexchange.com) |
| 123 points by steffenweber on Feb 1, 2017 | past | 13 comments |
|
| | Risk of appending secret salt to plaintext prior to RSA encryption? (crypto.stackexchange.com) |
| 1 point by e-sushi on Dec 28, 2016 | past |
|
| | Is there a standard for OpenSSL-interoperable AES encryption? (crypto.stackexchange.com) |
| 1 point by e-sushi on Dec 26, 2016 | past |
|
| | Can I use PBKDF2 as a stream cipher? (crypto.stackexchange.com) |
| 4 points by e-sushi on Dec 26, 2016 | past |
|
| | Key Distribution vs. Key Management? (crypto.stackexchange.com) |
| 3 points by e-sushi on Dec 26, 2016 | past |
|
| | Is password-based AES encryption secure at all? (crypto.stackexchange.com) |
| 2 points by e-sushi on Dec 26, 2016 | past |
|
| | Do Quantum Key Distribution and Physical Unclonable Functions Combine, and How? (crypto.stackexchange.com) |
| 1 point by e-sushi on Dec 23, 2016 | past |
|
| | Can we design a public-key infrastructure without certificate authorities? (crypto.stackexchange.com) |
| 2 points by e-sushi on Dec 23, 2016 | past |
|
| | Where can I find test vectors for ciphers? (crypto.stackexchange.com) |
| 1 point by e-sushi on Dec 23, 2016 | past |
|
| | What is the difference between CSPRNG and PRNG? (crypto.stackexchange.com) |
| 1 point by e-sushi on Dec 23, 2016 | past |
|
| | Schnorr protocol: how does malicious verifier win? (crypto.stackexchange.com) |
| 1 point by e-sushi on Dec 23, 2016 | past |
|
| | What is the difference between a 'cipher' and a 'mode of operation'? (crypto.stackexchange.com) |
| 2 points by e-sushi on Dec 18, 2016 | past |
|
| | Where can I find NTRU test vectors? (crypto.stackexchange.com) |
| 1 point by e-sushi on Dec 16, 2016 | past |
|
| | Dice rolls as entropy source for cryptographic purposes? (crypto.stackexchange.com) |
| 1 point by e-sushi on Dec 16, 2016 | past |
|
|
| More |