Skip to main content

Explore our questions

10 votes
1 answer
312 views

Is anyone using ORAM in practice?

2 votes
1 answer
75 views

Proof that GGM is Puncturable

2 votes
0 answers
67 views

PBKDF2 with Dstu7564Mac test examples

3 votes
2 answers
489 views

Solvability of Knapsack variant

1 vote
1 answer
77 views

Reconstruction in Packed Secret Sharing

-2 votes
0 answers
164 views

Performance Audit: 382k ops/sec Encryption Core on Legacy i5-7500 (293KB Rust)

1 vote
3 answers
350 views

Is the dealer a volunteer in Shamir secret sharing scheme?

0 votes
0 answers
84 views

PQC on resource poor hardware

0 votes
1 answer
52 views

mTLS Architecture: Cross-Signing vs. Independent CAs for B2B Integration

2 votes
1 answer
260 views

Poly-commitment based on Bulletproofs

2 votes
2 answers
1k views

Point halving formula for Koblitz curve over prime field

3 votes
1 answer
359 views

PGP subkey on key servers with missing secret key

0 votes
1 answer
68 views

How is the OW2H lemma used in OW-CPA proofs?

2 votes
1 answer
3k views

Cryptography of numbers

Browse more Questions