TransWikia.com
  1. All Categories
  2. Cryptography

Cryptography : Recent Questions and Answers (Page 10)

Find answers to your questions about Cryptography or help others by answering their Cryptography questions.

A hash function that returns a value interpreted as integer

I am new in cryptography. I need to compute a hash of a string value represented as follows:$name||i$ where $i$ is an integer. I use the following...

Asked on 01/30/2021 by jusmin

1 answer

Is the role of public key/private key determined arbitrarily or mathematically?

I have read about conflicting information about the roles of public/private keys. In one article(Asymmetrical-key algorithms), it says:Simply put each party, say Alice, picks a private random...

Asked on 01/29/2021 by 北美38fule

3 answer

How to simplify a the signing process in an elliptic curve signature scheme that involves a quadratic verification equation?

I am looking at a proprietary signature scheme used in production. It involves a short Weierstrass curve $E_{mathcal{W}}:y^2=x^3+ax+b$ in the prime field $mathbb{F}_p$. The parameters are set up...

Asked on 01/26/2021 by Columbida

2 answer

Decrypting small integers under RSA

Let $(n,e)$ be an RSA public key. Suppose $c = m^e pmod n$, where $c>1$ is a very small integer. For concreteness, say $c=2$ or ...

Asked on 01/22/2021 by M.S. Dousti

3 answer

Is Argon2 "sequential memory hard"?

The Scrypt paper here defines memory-hard and sequential memory hard functions as follows:Definition 1. A memory-hard algorithm on a Random Access Machine is an algorithm which uses...

Asked on 01/22/2021 by Modal Nest

0 answer

Hash Function Properties

What I am trying to understand is shown in all three properties of a secure hash function, I will focus on Preimage attack resistance. Preimage resistance: given a hash h,...

Asked on 01/19/2021 by Antonis Paragas

0 answer

Which is the simplest cryptographic algorithm which is close to commercial-level security?

An algorithm is simpler than another ifIt is easier to explain to a noob with basic high-school math knowledge.It is easier to securely self-implement by an intermediate programmer (Yes I...

Asked on 01/18/2021

7 answer

Why is it important that phi(n) is kept a secret, in RSA?

Why is it important that $phi(n)$ is kept a secret, in RSA?...

Asked on 01/15/2021 by johankj

5 answer

What is a quantifier in game-based definitions?

I'd like to know what are quantifiers in game-based security definitions (in cryptography) Some relevant examples and sources are also much appreciated.Edit: for example, in a formal definition, we...

Asked on 01/14/2021 by Ay.

0 answer

Why this isn't second preimage resistance?

I've been reading on preimage resistance and trying out few examples for the same and I'm trying to figure out why the following hash function does not have the second...

Asked on 01/09/2021

1 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP