Skip to main content

Explore our questions

0 votes
1 answer
45 views

Is Homomorphic Encryption constructed like a Header?

2 votes
1 answer
251 views

Factor multi-prime RSA

6 votes
1 answer
355 views

Strength of AES when 32-bits of the 128-bit key are known?

3 votes
0 answers
35 views

Use of symmetric remainder (balanced mod) to eliminate branching in polynomial additions for lattice-based cryptography: prior art/known limitations?

1 vote
0 answers
15 views

Two related question on MQ cryptosystems

0 votes
0 answers
18 views

Is this PRF + nullifier + signature construction secure for one-time tokens in a non-currency setting?

1 vote
0 answers
54 views

What is the real philosophical (geometric) reason for using a (discrete) Gaussian distribution for errors in the LWE problem?

1 vote
1 answer
41 views

ML-DSA without lattice

4 votes
1 answer
260 views

Why doesn't Learning With Errors use pseudoinverses?

2 votes
1 answer
578 views

Why can't you reverse engineer a valid ML-DSA secret key from a public key?

0 votes
1 answer
81 views

Next Message Functions in MPC Protocol

1 vote
1 answer
122 views

Design a multi party Private Set Intersection protocol with unconditional zero-sharing

35 votes
2 answers
14k views

7zip : Why does encrypting the same file with AES-256 not give the same output?

2 votes
1 answer
1k views

Encryption in popular compression file formats - 7zip, RAR, Zip

Browse more Questions