- All Categories
- Cryptography

Find answers to your questions about Cryptography or help others by answering their Cryptography questions.

According to the definition, an $varepsilon$-universal linear hash function family, given a field $mathbb{F}$, is a set of linear transformations $mathcal{H} subseteq mathbb{F}^{m,n}$ such that for any...

Asked on 12/02/2021 by JayTuma

0Hoepfuly a simple question. Given a group where the CDH problem is hard, if the adversary sees a public key $g^x$, is it easy or hard for the adversary...

Asked on 12/02/2021

1Given an RSA public key $(n,e)$ and the textbook-RSA encryption $c$ of a valid matching private exponent $d$, computed as $cgets d^ebmod n$: can we factor...

Asked on 11/30/2021

1Assume that $G$ is any cyclic group where the discrete log problem is hard, such as the elliptic curve group. Let $g$ be some generator of $G$....

Asked on 11/28/2021

1Is there an algorithmic, mathematical, technical or implementation "hack" to recover the private key or is it definitively encrypted without any particular mathematical property, like any message M?...

Asked on 11/28/2021

2I am completely noob in terms of cryptography and security.So I decided AES Cipher for encrypting my data. I pad my input data String with blank white spaces to...

Asked on 11/23/2021 by user3769778

2In the information-theoretic model with active adversaries, it seems to be well-known that no protocols with exact reconstruction of the secret exist for the task of verifiable secret sharing (VSS)...

Asked on 11/23/2021

1I understand how the RSA algorithm works for encryption and decryption purposes but I don't get how signing is done. Here's what I (think) I know and is common practice:If...

Asked on 11/19/2021

3Given an x-coordiante of a point on the SECP256K1 curve, is it possible to calculate the corresponding y-coorindate? (Assuming the point is a verifying public key that complies with the...

Asked on 11/17/2021

1Assume Alice and Bob are communicating using 'MAC then Encrypt' paradigm.Specifically, they are using HMAC with SHA256 as the hash function...

Asked on 11/13/2021 by AnswerFinder95

1Get help from others!

Recent Questions

- How Do I Get The Ifruit App Off Of Gta 5 / Grand Theft Auto 5
- Iv’e designed a space elevator using a series of lasers. do you know anybody i could submit the designs too that could manufacture the concept and put it to use
- Need help finding a book. Female OP protagonist, magic
- Why is the WWF pending games (“Your turn”) area replaced w/ a column of “Bonus & Reward”gift boxes?
- Does Google Analytics track 404 page responses as valid page views?

Recent Answers

- haakon.io on Why fry rice before boiling?
- Joshua Engel on Why fry rice before boiling?
- Jon Church on Why fry rice before boiling?
- Peter Machado on Why fry rice before boiling?
- Lex on Does Google Analytics track 404 page responses as valid page views?

© 2022 AnswerBun.com. All rights reserved. Sites we Love: PCI Database, MenuIva, UKBizDB, Menu Kuliner, Sharing RPP, SolveDir