Skip to main content

Explore our questions

0 votes
2 answers
49 views

How to find linear equations of a SBox?

1 vote
1 answer
197 views

Explaining Low-Degree Extension in layman terms

0 votes
0 answers
9 views

MOTION Protocol Addition

0 votes
0 answers
10 views

why the encryption algorithm must be a linear function,and f must be quadratic polynomial

0 votes
0 answers
9 views

Non-linear feedback shift register with 2 taps, of which 1 negated

0 votes
0 answers
9 views

SHA3 API using Openssl Assembly

2 votes
1 answer
61 views

Barret Reduction code for Kyber

1 vote
1 answer
61 views

How to correctly multiply homomorphically two RLWE-Based encrypted numbers

0 votes
1 answer
28 views

128-bit hashes for signature schemes?

1 vote
0 answers
27 views

Is parallelism really useful for memory-hard key derivation functions?

-1 votes
0 answers
18 views

Is there any way of point singling in elliptic curve cryptography

6 votes
3 answers
706 views

Verify partial message given hash of full message

0 votes
0 answers
26 views

Why are Montgomery and twisted Edwards curve said to be all quadratic twist secure?

-1 votes
0 answers
42 views

Seeking guidance for research In Cryptography

Browse more Questions