Skip to main content

Explore our questions

0 votes
1 answer
17 views

Is Homomorphic Encryption constructed like a Header?

4 votes
1 answer
170 views

Strength of AES when 32-bits of the 128-bit key are known?

3 votes
0 answers
32 views

Use of symmetric remainder (balanced mod) to eliminate branching in polynomial additions for lattice-based cryptography: prior art/known limitations?

1 vote
0 answers
14 views

Two related question on MQ cryptosystems

0 votes
0 answers
15 views

Is this PRF + nullifier + signature construction secure for one-time tokens in a non-currency setting?

1 vote
0 answers
50 views

What is the real philosophical (geometric) reason for using a (discrete) Gaussian distribution for errors in the LWE problem?

1 vote
1 answer
33 views

ML-DSA without lattice

4 votes
1 answer
257 views

Why doesn't Learning With Errors use pseudoinverses?

2 votes
1 answer
572 views

Why can't you reverse engineer a valid ML-DSA secret key from a public key?

0 votes
1 answer
78 views

Next Message Functions in MPC Protocol

1 vote
1 answer
121 views

Design a multi party Private Set Intersection protocol with unconditional zero-sharing

35 votes
2 answers
14k views

7zip : Why does encrypting the same file with AES-256 not give the same output?

2 votes
1 answer
1k views

Encryption in popular compression file formats - 7zip, RAR, Zip

0 votes
0 answers
44 views

Universal one-way function from Rule 110 cellular automaton?

Browse more Questions