TransWikia.com
  1. All Categories
  2. Cryptography

Cryptography : Recent Questions and Answers (Page 3)

Find answers to your questions about Cryptography or help others by answering their Cryptography questions.

Low weight linear $varepsilon$-universal hash function

According to the definition, an $varepsilon$-universal linear hash function family, given a field $mathbb{F}$, is a set of linear transformations $mathcal{H} subseteq mathbb{F}^{m,n}$ such that for any...

Asked on 12/02/2021 by JayTuma

0 answer

Diffie-Hellman: difficulty of computing $g^{x^2}$ given $g^x$?

Hoepfuly a simple question. Given a group where the CDH problem is hard, if the adversary sees a public key $g^x$, is it easy or hard for the adversary...

Asked on 12/02/2021

1 answer

In RSA, given public key $(n,e)$ and $d^ebmod n$, can we factor $n$?

Given an RSA public key $(n,e)$ and the textbook-RSA encryption $c$ of a valid matching private exponent $d$, computed as $cgets d^ebmod n$:  can we factor...

Asked on 11/30/2021

1 answer

What is this problem called and is it hard? given $g^x$ output ($g^y, xy$)

Assume that $G$ is any cyclic group where the discrete log problem is hard, such as the elliptic curve group. Let $g$ be some generator of $G$....

Asked on 11/28/2021

1 answer

With RSA or ECC, if I encrypt my private key with my public key, is there a way to recover my private key?

Is there an algorithmic, mathematical, technical or implementation "hack" to recover the private key or is it definitively encrypted without any particular mathematical property, like any message M?...

Asked on 11/28/2021

2 answer

What will be appropriate AES padding characters?

I am completely noob in terms of cryptography and security.So I decided AES Cipher for encrypting my data. I pad my input data String with blank white spaces to...

Asked on 11/23/2021 by user3769778

2 answer

Why does verifiable secret sharing with an honest majority require a broadcast channel?

In the information-theoretic model with active adversaries, it seems to be well-known that no protocols with exact reconstruction of the secret exist for the task of verifiable secret sharing (VSS)...

Asked on 11/23/2021

1 answer

How does RSA signature verification work?

I understand how the RSA algorithm works for encryption and decryption purposes but I don't get how signing is done. Here's what I (think) I know and is common practice:If...

Asked on 11/19/2021

3 answer

Is it possible to compute the y-coordinate of a point on SECP256K1, given only the x-coordinate

Given an x-coordiante of a point on the SECP256K1 curve, is it possible to calculate the corresponding y-coorindate? (Assuming the point is a verifying public key that complies with the...

Asked on 11/17/2021

1 answer

Padding Oracle Attack with AES-128-CTR and MAC

Assume Alice and Bob are communicating using 'MAC then Encrypt' paradigm.Specifically, they are using HMAC with SHA256 as the hash function...

Asked on 11/13/2021 by AnswerFinder95

1 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP