Find answers to your questions about Cryptography or help others by answering their Cryptography questions.
According to the definition, an $varepsilon$-universal linear hash function family, given a field $mathbb{F}$, is a set of linear transformations $mathcal{H} subseteq mathbb{F}^{m,n}$ such that for any...
Asked on 12/02/2021 by JayTuma
0 answerHoepfuly a simple question. Given a group where the CDH problem is hard, if the adversary sees a public key $g^x$, is it easy or hard for the adversary...
Asked on 12/02/2021
1 answerGiven an RSA public key $(n,e)$ and the textbook-RSA encryption $c$ of a valid matching private exponent $d$, computed as $cgets d^ebmod n$: can we factor...
Asked on 11/30/2021
1 answerAssume that $G$ is any cyclic group where the discrete log problem is hard, such as the elliptic curve group. Let $g$ be some generator of $G$....
Asked on 11/28/2021
1 answerIs there an algorithmic, mathematical, technical or implementation "hack" to recover the private key or is it definitively encrypted without any particular mathematical property, like any message M?...
Asked on 11/28/2021
2 answerI am completely noob in terms of cryptography and security.So I decided AES Cipher for encrypting my data. I pad my input data String with blank white spaces to...
Asked on 11/23/2021 by user3769778
2 answerIn the information-theoretic model with active adversaries, it seems to be well-known that no protocols with exact reconstruction of the secret exist for the task of verifiable secret sharing (VSS)...
Asked on 11/23/2021
1 answerI understand how the RSA algorithm works for encryption and decryption purposes but I don't get how signing is done. Here's what I (think) I know and is common practice:If...
Asked on 11/19/2021
3 answerGiven an x-coordiante of a point on the SECP256K1 curve, is it possible to calculate the corresponding y-coorindate? (Assuming the point is a verifying public key that complies with the...
Asked on 11/17/2021
1 answerAssume Alice and Bob are communicating using 'MAC then Encrypt' paradigm.Specifically, they are using HMAC with SHA256 as the hash function...
Asked on 11/13/2021 by AnswerFinder95
1 answerGet help from others!
Recent Answers
Recent Questions
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP