TransWikia.com
  1. All Categories
  2. Cryptography

Cryptography : Recent Questions and Answers (Page 6)

Find answers to your questions about Cryptography or help others by answering their Cryptography questions.

Curve25519 Attacks and Security

Curve25519 is a pretty secure way to exchange a key. In the original Paper and on SafeCurves a lot of attacks and security aspects...

Asked on 10/24/2021

0 answer

DES decryption of the homomorphic encryption ciphertext

I implemented an application using partial homomorphic encryption for outsourced computations. To get an efficient bandwidth, I am thinking to apply (DES) symmetric algorithm to encrypt the message instead of...

Asked on 10/24/2021

0 answer

LWE versus neural nets

It seems like that the construction of the LWE problem: $As + e = b$ resembles how neural nets work: $Ax + b = y$. In LWE, we...

Asked on 10/24/2021 by Steven Yue

2 answer

Proof for, Vectors sampled from $D_{(L,r)}$ have Euclidean norm at most $rsqrt{n}$ with a high probability

For any $n$-dimensional lattice $L$ and $r > 0$, a point sampled from $D_{L,r}$ has Euclidean norm at most $rsqrt{n}$ except with probability at...

Asked on 10/24/2021

0 answer

How are security proofs performed for Certificateless PEKS schemes?

I have been studying several CLPEKS (CertificateLess Public-key Encryption scheme with Keyword Search) schemes and I understand the security assumptions and the several types of security models used for the...

Asked on 10/24/2021 by Venkat Chenam

0 answer

TLS 1.2 is still secure or should we move to TLS 1.3?

There are some vulnerability such POODLE, that allows the attacker to gain access to encrypted blocks of data and then gain exposure to plain text information using side channels.Another...

Asked on 10/24/2021 by R1w

1 answer

FHE over the integers - Is that paper's scheme known to be insecure against quantum adversaries?

I was reading the paper Fully Homomorphic Encryption over the Integers, and startedwondering if there is a known quantum attack on their main scheme, because ...

Asked on 10/24/2021 by user991

1 answer

IND-CCA1 RSA padding?

I've found a way to complete a task which I'd solve with passwords or by sending keys over the wire (otherwise) by using RSA's homomorphic property. I'm restricted to RSA...

Asked on 10/24/2021

0 answer

File encryption using per-user-encrypted shared key

So I'm looking to encrypt files using AES CTR, using a shared key that would be accessed via a per-user password. My two main concerns are:making sure that the algorithms...

Asked on 10/24/2021 by Scott Brickey

0 answer

Encrypting/Decrypting using RSA and AES; standards?

I'm looking for a standard way of encrypting and signing a message using RSA and AES. I understand that in pseudo-code the actions taking place are like this: Alice's...

Asked on 10/24/2021 by Alfe

0 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP