TransWikia.com
  1. All Categories
  2. Cryptography

Cryptography : Recent Questions and Answers (Page 12)

Find answers to your questions about Cryptography or help others by answering their Cryptography questions.

Multi signature encryption (multiple people can decrypt)

I understand that multi sig transactions exist so that X of N need to sign to release a transaction. If only 1 of N is required I guess any of...

Asked on 12/26/2020 by besch

1 answer

Determine if a public key point y is negative or positive, odd or even?

Take an elliptic curve cryptography public key (x, y) and its additive inverse (x, -y). How do you identify which is the positive point and which is the negative point?...

Asked on 12/25/2020 by Prabu r

2 answer

"official" guidelines about the minimum length of a truncated hash

I am looking for some reference documentation suggesting a minimum reasonable length for a truncated hash (specifically, a truncated SHA-256 hash) to ensure preimage resistance. Obviously, truncating a SHA-256 hash...

Asked on 12/19/2020 by user975176

1 answer

Generate ANF from SBox

Given an SBox, how can I generate its component equations (in ANF)? For example, let's say I have this SBox:6, 4, 7, 8, 0, 5, 2, 10,...

Asked on 12/14/2020 by hola

4 answer

Difference between server salt and client salt?

Basically I am trying to understand the difference between server salt and client salt. I know that the client salt is used to make encryption harder for hackers, but I...

Asked on 12/14/2020 by John Chen

1 answer

Is fingerprint authentication meaningless if the server/client is closed source?

I'm talking about when two chat users want to verify their identities via public key fingerprints. If the Client app is closed source, and we cannot see what it is...

Asked on 12/10/2020 by Dante

0 answer

How optimize elliptic curve point multiplication?

For 256 bits "Double-and-add" multiplication uses about 128 addings and 256 doublings, where "Montgomery ladder" uses near 256 addings and 256 doublings."Double-and-add" in my Intel(R) Core(TM) i3-8130U CPU @...

Asked on 12/10/2020 by Andrzej

0 answer

Do all AEAD implementations use symmetric key ciphers in practice?

Everything I've seen so far in modern implementations (the Linux Kernel AEAD API, JVM crypto provider (AES-GCM), RFC 8439, libsodium, etc)...

Asked on 12/09/2020 by Les Hazlewood

3 answer

What does the $e$ operation mean in cryptography research papers?

I read a cryptography scheme that it include the following operation: $$c= H(e(g_1,g_n)^t)$$where H is a hash function.I need to know what the operation $e$ means....

Asked on 12/03/2020 by kiukige

1 answer

How does RSA blind signature calculation works?

I am having a struggle calculating (ii) and (iii), Can anybody help me with the calculation? RSA blind signature algorithm:Given two prime numbers: $p=11$ and $q=3$The...

Asked on 11/18/2020 by Navid Niknezhad

0 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP