Skip to main content

Explore our questions

0 votes
0 answers
34 views

Why the intuition simulation is wrong in "How to Simulate It" - section 8 extract input OT?

0 votes
0 answers
15 views

Formal connection between fully homomorphic encryption schemes and field homomorphism

1 vote
1 answer
67 views

How to choose the distribution of error and secret vectors in LWE-based KEMs

2 votes
0 answers
35 views
+50

Trying to understand length recovery attack on EAP-MD5

15 votes
2 answers
46k views

AES vs RSA - Which is stronger given two scenarios?

0 votes
1 answer
51 views

implementing pedersen commtiment using lib sodium

1 vote
1 answer
49 views

Prove that there is no universal Hard-Core Predicates

0 votes
0 answers
49 views

Is sha256 quantum secure?

2 votes
1 answer
38 views

How to Do Beaver's Triple without a Trust Party?

1 vote
0 answers
10 views

Why do many ZKSnarks divide the Witness into Public & Private Parts?

0 votes
1 answer
67 views

Understanding the Role of Associated Data and Tag Calculation in AES-GCM

3 votes
2 answers
103 views

Definition of non-interactive non-commiting encryption

2 votes
0 answers
25 views

Sequences over groups and multiplicative recurrences

2 votes
1 answer
54 views

How can I imply the order of a series of messages?

Browse more Questions