Skip to main content

Explore our questions

3 votes
1 answer
114 views

Bounds on distribution of elliptic curve components

2 votes
3 answers
395 views

Benefits and drawbacks of SSH RSA long key

2 votes
1 answer
351 views

Real-world instantiation of NIZK protocol from Fiat-Shamir

0 votes
0 answers
39 views

Modular binomial exponent manipulation and assumption of coprimality

5 votes
1 answer
2k views

openssl encryption salt length

1 vote
0 answers
23 views

How to choose the statistical security parameter for MPC protocols

4 votes
3 answers
595 views

Zero-knowledge proof that the exponents of a Pedersen commitment are not zero

4 votes
1 answer
125 views

On the Adaptive Security of MPC Protocols

2 votes
1 answer
117 views

Sensitivity Maximization RAPPOR (Local Differential Privacy)

0 votes
0 answers
61 views

Related precise SAT encoding of SHA-256

8 votes
0 answers
334 views

Boolean-to-arithmetic masking

0 votes
1 answer
73 views

Can Pre-Computed SAT Solution Speed Up SHA-256 Preimage Search via Unit Propagation?

5 votes
5 answers
856 views

Recovering Public Key from ECDSA signature- why is it required at all?

3 votes
1 answer
128 views

How secure is COMP128-2/3 algorithm against SIM cloning?

Browse more Questions