Skip to main content

Explore our questions

0 votes
0 answers
12 views

ML-KEM (Kyber) implementation not matching ACVP Gen/Vals test vectors

3 votes
1 answer
693 views

Proving equivalency of two security definitions of symmetric encryption schemes

26 votes
3 answers
21k views

How effective is quantum computing against elliptic curve cryptography?

2 votes
1 answer
47 views

In the Fiat–Shamir transform, is it secure to derive each challenge from the previous one instead of hashing the entire transcript?

1 vote
1 answer
66 views

Black Box vs Non-Black Box

1 vote
0 answers
26 views

Round Collapsing vs without Round Collapsing

6 votes
2 answers
1k views

Are most RSA integers unbalanced?

10 votes
1 answer
2k views

Practical uses of Manipulation Detection Code (MDC) and IGE

0 votes
1 answer
122 views

Utility Guarantee of Small Data Base Mechanism in Differential Privacy

2 votes
2 answers
588 views

Private Information Retrieval and Writing at the same time possible?

6 votes
1 answer
295 views

Secure Secret Sharing to a Distributed Key

2 votes
3 answers
2k views

3DES security when K1=K3

2 votes
1 answer
728 views

Decrypting a ciphertext in ElGamal's cryptosystem

1 vote
1 answer
152 views

Why $1\leq r\leq p-1$ verification is needed for (hashed) Elgamal signature?

Browse more Questions