| | What is the use of Mersenne Primes in cryptography? (crypto.stackexchange.com) |
|
1 point by nomilk 16 days ago | past
|
| | Could celestial objects be used in cryptography? (crypto.stackexchange.com) |
|
2 points by wslh 5 months ago | past
|
| | ELI5 Post Quantum Kyber Encryption Algorithm (crypto.stackexchange.com) |
|
3 points by ggasp 8 months ago | past
|
| | Are RSA signatures distinguishable from random data? (crypto.stackexchange.com) |
|
1 point by susam 10 months ago | past
|
| | Are curve secp256k1 ECDSA signatures distinguishable from random data? (crypto.stackexchange.com) |
|
2 points by tosh 11 months ago | past
|
| | Can you use memory errors as a source of randomness for cryptography? (crypto.stackexchange.com) |
|
1 point by notpushkin on Sept 4, 2023 | past
|
| | Largest integer factored by Shor's algorithm? (crypto.stackexchange.com) |
|
2 points by qsantos on July 11, 2023 | past
|
| | Can an AI generate random numbers? (crypto.stackexchange.com) |
|
4 points by Alupis on April 25, 2023 | past | 1 comment
|
| | Is there a feasible preimage attack for any hash function today? (crypto.stackexchange.com) |
|
2 points by tgamblin on April 5, 2023 | past | 2 comments
|
| | Why does my SSH private key still work after changing some bytes? (2016) (crypto.stackexchange.com) |
|
551 points by curling_grad on Dec 31, 2022 | past | 84 comments
|
| | Is AES-128 quantum safe? (crypto.stackexchange.com) |
|
4 points by samuel246 on Dec 8, 2022 | past
|
| | Why does GMP only run Miller-Rabin test twice when generating a prime? (crypto.stackexchange.com) |
|
1 point by irjustin on Dec 3, 2022 | past
|
| | MD5: Existence of Invariant (Fixed Point) (crypto.stackexchange.com) |
|
2 points by susam on Nov 13, 2022 | past
|
| | Why use non-extractable keys? (crypto.stackexchange.com) |
|
2 points by EGreg on Nov 11, 2022 | past
|
| | Why do web APIs tend to use pre-shared keys for client auth instead of pubkeys? (crypto.stackexchange.com) |
|
2 points by zhxshen on Sept 13, 2022 | past | 1 comment
|
| | Why do web-services tend to use preshared secret keys for client authentication (crypto.stackexchange.com) |
|
1 point by todsacerdoti on Sept 12, 2022 | past
|
| | How easy is it in 2022 to find a SHA1 collision? (crypto.stackexchange.com) |
|
339 points by gary_0 on April 24, 2022 | past | 165 comments
|
| | Tuples secure multi-party computation against malicious adversaries algorithms (crypto.stackexchange.com) |
|
2 points by wslh on March 19, 2022 | past
|
| | Apple's New CSAM Protections May Make iCloud Photos Bruteforceable (crypto.stackexchange.com) |
|
233 points by NTroy on Aug 8, 2021 | past | 81 comments
|
| | Is using the same IV the same as not using an IV at all? (crypto.stackexchange.com) |
|
6 points by likecarter on June 9, 2021 | past | 1 comment
|
| | Are hash functions strong against quantum cryptanalysis? (crypto.stackexchange.com) |
|
2 points by doener on March 8, 2021 | past
|
| | Crypto.se is debunking Terra Quantum AG claim to have broken AES as a scam (crypto.stackexchange.com) |
|
1 point by anomalroil on Feb 10, 2021 | past
|
| | Why is HMAC-SHA1 still considered secure? (2015) (crypto.stackexchange.com) |
|
2 points by chanind on Dec 31, 2020 | past
|
| | ASK HN: Are there cryptographical flaws in this e2ee website chat widget? (crypto.stackexchange.com) |
|
1 point by AdriaanvRossum on April 19, 2020 | past | 1 comment
|
| | Is 128-bit security still considered strong in 2020 (crypto.stackexchange.com) |
|
1 point by azhenley on Jan 24, 2020 | past
|
| | Is 128-bit security still considered strong in 2020? (crypto.stackexchange.com) |
|
2 points by anomalroil on Jan 14, 2020 | past
|
| | Public key – Who verifies the trust of certificate authorities? (crypto.stackexchange.com) |
|
4 points by vinnyglennon on Dec 27, 2019 | past
|
| | Can you create a time capsule using cryptography? (crypto.stackexchange.com) |
|
1 point by bikeshaving on July 8, 2019 | past | 1 comment
|
| | Is Convergent Encryption Secure? (crypto.stackexchange.com) |
|
2 points by anaphor on June 14, 2019 | past
|
| | What are the implications of the new alleged key recovery attack on SIMON? (crypto.stackexchange.com) |
|
1 point by hsnewman on May 14, 2019 | past
|
|
|
More |