TransWikia.com
  1. All Categories
  2. Cryptography

Cryptography : Recent Questions and Answers (Page 11)

Find answers to your questions about Cryptography or help others by answering their Cryptography questions.

Threshold schemes

I am looking for a reference that lists all major $(n,k)$ secret sharing schemes. Can anyone help me get such a reference?...

Asked on 01/08/2021 by Erfan Hosseini

0 answer

Encrypt a big file in blocks with AES-GCM: how many nonce do we need?

I need to encrypt big files using AES-GCM, potentially 10 GB or more. For memory (RAM) reasons, I need to processs them by blocks (let's say 16 MB), rather than...

Asked on 01/05/2021

2 answer

Unconditionally secure block cipher for a finite number of blocks

I am wondering if someone can point me toward a block cipher that provides unconditional security for only a bounded number of encryptions. For example, you can encrypt ...

Asked on 01/05/2021 by GEG

1 answer

Suitable 16-bit checksum?

I am writing a toy1 transport protocol and I am trying to implement a feature whereby:A 16-bit checksum is included in every packet.This checksum can be extended to be 48-bit...

Asked on 01/03/2021

3 answer

Are there actual consequences of padding oracle attacks?

I am writing a program that encrypts data in Python and heard about padding oracle attacks, but I think they are overrated (I mean, what are the...

Asked on 01/01/2021 by Khaled Gaber

2 answer

What are the current limitations (and capabilities) of Functional Encryption used for access control?

I'm trying to make my way in Functional Encryption used for access control. I read a lot of papers such as "How to Run Turing Machines on Encrypted...

Asked on 01/01/2021 by MaVVamaldo

1 answer

AES Padding (Nullbytes vs PKCS7)

I currently implement the AES(128,192,256)(ECB,CBC). Does the type of padding affect security?I just want to fill the blocks with null bytes....

Asked on 12/31/2020 by TheDummy

1 answer

A secure public-key cryptosystem

Is there any public-key cryptosystem that is (possibly) secure against $NPcap coNP$ adversary?...

Asked on 12/30/2020 by daidalos

1 answer

Using different hashing function with ECDSA

I came across an IC device configuration & security flow and the details are illustrated in image below.I'm wondering must the ECDSA pair with the SHA Hashing function? Alternatively,...

Asked on 12/28/2020 by Pi-Turn

2 answer

Are (EC) DSA blind signatures possible?

I've been searching for a way to create blind ECDSA signatures.My research and experimentation has led me to believe that this is not possible. I've been attempting to...

Asked on 12/27/2020

2 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP