Find answers to your questions about Cryptography or help others by answering their Cryptography questions.
I am new in cryptography. I need to compute a hash of a string value represented as follows:$name||i$ where $i$ is an integer. I use the following...
Asked on 01/30/2021 by jusmin
1 answerI have read about conflicting information about the roles of public/private keys. In one article(Asymmetrical-key algorithms), it says:Simply put each party, say Alice, picks a private random...
Asked on 01/29/2021 by 北美38fule
3 answerI am looking at a proprietary signature scheme used in production. It involves a short Weierstrass curve $E_{mathcal{W}}:y^2=x^3+ax+b$ in the prime field $mathbb{F}_p$. The parameters are set up...
Asked on 01/26/2021 by Columbida
2 answerLet $(n,e)$ be an RSA public key. Suppose $c = m^e pmod n$, where $c>1$ is a very small integer. For concreteness, say $c=2$ or ...
Asked on 01/22/2021 by M.S. Dousti
3 answerThe Scrypt paper here defines memory-hard and sequential memory hard functions as follows:Definition 1. A memory-hard algorithm on a Random Access Machine is an algorithm which uses...
Asked on 01/22/2021 by Modal Nest
0 answerWhat I am trying to understand is shown in all three properties of a secure hash function, I will focus on Preimage attack resistance. Preimage resistance: given a hash h,...
Asked on 01/19/2021 by Antonis Paragas
0 answerAn algorithm is simpler than another ifIt is easier to explain to a noob with basic high-school math knowledge.It is easier to securely self-implement by an intermediate programmer (Yes I...
Asked on 01/18/2021
7 answerWhy is it important that $phi(n)$ is kept a secret, in RSA?...
Asked on 01/15/2021 by johankj
5 answerI'd like to know what are quantifiers in game-based security definitions (in cryptography) Some relevant examples and sources are also much appreciated.Edit: for example, in a formal definition, we...
Asked on 01/14/2021 by Ay.
0 answerI've been reading on preimage resistance and trying out few examples for the same and I'm trying to figure out why the following hash function does not have the second...
Asked on 01/09/2021
1 answerGet help from others!
Recent Answers
Recent Questions
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP