AnswerBun.com
  1. All Categories
  2. Cryptography

Cryptography : Recent Questions and Answers

Find answers to your questions about Cryptography or help others by answering their Cryptography questions.

Binomial distribution sampling - concrete example

Can anyone give me an explicit example of how one can samples from the binomial distribution defined in NewHope's paper? What is the difference of sampling from rounded Gaussian in...

Asked on 01/04/2022

0 answer

Using xor encryption in the following use case

I use an encryption scheme based on a symmetric cipher, with the corresponding symmetric key encrypted with RSA/OAEP using the public RSA key of the recipient.I now want to...

Asked on 12/31/2021 by Kaa

1 answer

How to justify the lightweight symmetric PRESENT encryption algorithm is more secure?

My domain is VLSI design, currently, I'm working on PRESENT Lightweight cryptographic algorithm.I want to know how to improve the security of the algorithm rather than increasing...

Asked on 12/31/2021 by Sunitha Tappari

0 answer

Difference Between an Authentication Token and an OTP (One Time Password)

I would like to better understand why some people use the term One Time Password and other Authentication Token. I have noticed that in academic circles, there is a differentiation...

Asked on 12/28/2021 by DaWNFoRCe

0 answer

Using XOR to derive a data key for ECIES

I have been thinking about a rather simple enhancement for (EC)IES / RSA-KEM. The scheme would allow you to encrypt data while the calculation of the session / data key...

Asked on 12/26/2021 by Maarten Bodewes

2 answer

Digital Signature or MAC Yielding Non-Binary Verification Predicate

Is there a digital signature or MAC scheme in which, the verification algorithm returns not ${text{Valid},text{Invalid}}$, but a discrete (finite or infinite) set of result such as ${text{Valid-for-A},...

Asked on 12/24/2021

0 answer

Computing PGP ed25519 and curve25519 keygrips?

There are public key algorithmic differences for how PGP computes fingerprints and keygrips. For the v4 protocol, fingerprints are not exclusively computed from public keys while keygrips are. RFC 4880...

Asked on 12/21/2021 by skaht

2 answer

Find Consecutive X-Coordinate algorithm

The question is as follows: Is there an algorithm to calculate a $(x,y)$ pair which is consecutive to an existing $x$-Coordinate on an elliptic curve? Background Information for...

Asked on 12/21/2021 by kmart875

1 answer

Is there any proof for ECDSA signature algorithm?

Related: Is there an interactive version of ECDSA signature protocol like the Schnorr identification protocol?...

Asked on 12/19/2021 by sanket1729

1 answer

What basic knowledge is required to understand SIKE?

I'm interested in learning about Supersingular Isogeny based Key Encapsulation mechanism.Currently, I only know all the basic knowledge about how standard Elliptic Curve Cryptography, works, using Weierstrass equations....

Asked on 12/19/2021 by Vivekanand V

1 answer

Ask a Question

Get help from others!

© 2022 AnswerBun.com. All rights reserved. Sites we Love: PCI Database, MenuIva, UKBizDB, Menu Kuliner, Sharing RPP