Find answers to your questions about Cryptography or help others by answering their Cryptography questions.
AES/ECB is commonly considered "weak" to the point that some static analysis software identifies it as not secure and suggests using AES/CBC instead. The question is: what if size of...
Asked on 10/24/2021 by Andriy Gerasika
1 answerThis could be a question for CodeReview.SE, but I thought it might require non-trivial cryptographic knowledge to merit it on-topic here. The C language is chosen as it's a common...
Asked on 10/24/2021
0 answerOn a wiki page, archived by now, Mozilla switched from recommending self generated DH groups to the ones predefinded in RFC 7919. The recommendation...
Asked on 10/24/2021 by wedi
1 answerWe're building an ingame GPS system where only 5 lines of code are executed a second. We're starting to face problems with people spoofing the satellites we use to triangulate....
Asked on 10/24/2021 by AlexAndHisScripts
1 answerOf course, padding is superfluous when AES with CBC is used if you know that the plaintext length is a multiple of the block size. But does the padding precipitate...
Asked on 10/24/2021
1 answerOne of the most important attacks on Elliptic Curve cryptography is Pollard's Rho method. The effect on security can be seen on SafeCurves. This attack is pretty...
Asked on 10/24/2021
0 answerIt is stated inWinternitz One time signature security that MD5 is not safe for Winternitz due to collision attack. Given that WOTS generates multiple, say 32 private keys...
Asked on 10/24/2021 by evernal
1 answerMy research is to propose highly secure MPC protocol with some conditions. Especially, I want to consider thatsecurity against malicious (active) adversarydishonest majority settinginformation-theoretic securityI know SPDZ family that achieve...
Asked on 10/24/2021 by shoy700
1 answerMore precisely, and as for RSA, is it really true that it is not feasible to recirculate one of the keys knowing ONLY the other with the Elliptic Curves, as...
Asked on 10/24/2021 by Benoit LEGER-DERVILLE
2 answerCould someone please provide the math proof; $$ ((g^a)bmod p)^b bmod p = ((g^b)bmod p)^a bmod p $$...
Asked on 03/07/2021 by mppub
1 answerGet help from others!
Recent Questions
Recent Answers
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP