Skip to main content
The 2024 Developer Survey results are live! See the results

Explore our questions

4 votes
2 answers
352 views

Concatenation of password and TOTP - possible issues

0 votes
0 answers
9 views

How to transform a univariate polynomial over $\mathbb{F}_{2^n}$ into a multivariate Boolean polynomial over $\mathbb{F}_2^n$

2 votes
2 answers
73 views

Probability of Enhanced MR test outcome for NOT A POWER OF PRIME

1 vote
0 answers
13 views

Deliberate error in decryption by modifying the encryption

1 vote
1 answer
235 views

Merkle tree vs chronological merkle tree

2 votes
1 answer
20 views

How do I compute unified PADD on BLS12-377 using the twisted Edwards curve equations?

8 votes
1 answer
32k views

What does AES256-CTS-HMAC-SHA1-96 mean in relation to Kerberos?

0 votes
0 answers
20 views

Public key peppercrypto maybe blake2b idk

2 votes
2 answers
104 views

Is the quality of hash function essential in HKDF?

6 votes
3 answers
841 views

Can Curve25519 shared secret be safely truncated to half its size?

0 votes
0 answers
20 views

Sparse Packing for CKKS

0 votes
0 answers
24 views

Homomorphic Subtraction and Sign Evaluation

10 votes
3 answers
21k views

What's the difference between PBKDF2 and HMAC-SHA256 in security?

0 votes
3 answers
217 views

What hash algorithm/construction to use to prove Data Availability?

Browse more Questions