## Tag: cryptography

93 Why hasn't there been an encryption algorithm that is based on the known NP-Hard problems? 2012-03-14T08:02:26.627

49 How to verify number with Bob without Eve knowing? 2012-03-14T08:18:00.390

28 Meaning of: "'If factoring large integers is hard, then breaking RSA is hard,' is unproven" 2015-12-13T22:35:41.007

28 What is an extremely basic asymmetric cipher that I can present at the pub? 2017-12-30T11:58:43.730

22 Given RSA, why do we not know if public-key cryptography is possible? 2015-09-15T20:32:07.163

18 Why is encrypting with the same one-time-pad not good? 2012-03-14T06:52:07.727

15 Could quantum computing eventually be used to make modern day hashing trivial to break? 2012-03-21T07:01:46.637

15 Are asymptotic lower bounds relevant to cryptography? 2012-04-11T16:44:36.490

15 How does an operating system create entropy for random seeds? 2014-08-25T15:15:58.987

15 Why did RSA encryption become popular for key exchange? 2016-04-01T13:29:00.810

13 How to practically construct regular expander graphs? 2013-04-24T13:37:26.307

12 Proving the security of Nisan-Wigderson pseudo-random number generator 2012-03-13T04:08:58.890

12 Break an authentication protocol based on a pre-shared symmetric key 2012-03-16T00:56:14.627

12 Is it possible to create a "Time Capsule" using encryption? 2012-04-26T13:37:39.000

12 If P=NP, are there cryptosystems that would require n^2 time to break? 2016-04-28T14:59:49.340

11 How is the key in a private key encryption protocol exchanged? 2012-03-17T17:30:02.783

11 How does a wifi password encrypt data using WEP and WPA? 2012-03-23T19:41:23.180

11 Choosing taps for Linear Feedback Shift Register 2012-04-07T22:38:27.080

10 Weak hashing function for memorable IPv6 addresses 2012-07-15T17:57:04.403

9 Attack on hash functions that do not satisfy the one-way property 2012-04-11T16:25:33.290

9 What is the difference between classical crypto and post-quantum crypto? 2012-04-30T17:11:36.020

9 Is WPA2 with pre-shared key an example of a zero-knowledge proof? 2012-05-04T22:22:55.337

9 What mathematics can be interesting for these CS areas? 2013-07-06T16:58:40.467

9 Could program verification techniques prevent bugs of the genre of Heartbleed from occurring? 2014-04-15T14:30:22.640

9 How to measure the complexity of the discrete logarithm problem? 2016-10-22T16:23:13.773

8 Key secrecy vs Algorithm secrecy 2012-05-11T17:57:33.800

8 NP Problems with unique solution 2014-04-23T01:24:04.347

8 Running an algorithm on data remotely and ensuring answer has not been tampered with 2015-10-15T20:53:30.193

8 Can a public key be used to decrypt a message encrypted by the corresponding private key? 2016-06-15T12:52:08.487

7 How can encryption involve randomness? 2012-05-23T21:13:58.847

7 If xor-ing a one way function with different input, is it still a one way function? 2013-03-10T00:39:41.690

7 Length-preserving one-way functions 2013-03-20T08:46:30.130

7 How hard is it to solve for $P$ in $A = PBP^{-1}$? 2013-04-16T21:10:39.030

7 Is there a continuous hash? 2015-05-18T05:06:43.377

7 1-to-1 cryptographically secure bit shuffling 2015-12-19T21:14:59.650

7 Zero-knowledge proof: Abstract example 2016-06-07T17:14:52.230

7 Examples of NP Complete key exchange algorithms 2016-08-19T02:35:14.333

7 Does there exist an equivalent arithmetic circuit for each computable function? 2017-05-01T10:27:00.403

6 Mental poker: proving dealt hand is fair 2012-12-08T21:20:39.903

6 Quadratic residue and integer factoring 2013-02-10T17:33:56.953

6 Completeness of formal definition of 'hardness on the average' 2013-08-08T12:43:21.820

6 Invertible function that randomizes order 2016-03-09T22:05:30.767

6 How do you rank the strings represented by a regular expression? 2016-03-31T21:28:44.390

5 A hash function with predicted collisions 2012-08-06T21:22:55.007

5 Negligible Function in Cryptography 2013-04-06T09:45:34.340

5 Can all NP-complete cryptosystems be broken if one is broken? 2014-03-22T22:34:35.087

5 Correctness of a zigzag algorithm to find the most similar vector in a bounded integer lattice 2015-09-22T14:30:42.633

5 One way recurrence O(N)->O(1) 2015-10-17T13:03:02.480

5 Is it possible to build short proofs of arbitrary folds over a huge list? 2017-01-18T16:22:20.200

4 Break an authentication protocol based on a pre-shared symmetric key, with message numbers 2012-03-17T23:42:57.927

4 LFSR sequence computation 2012-08-26T13:28:54.913

4 How to show composition of one way function is not such? 2012-12-01T10:21:02.673

4 What will i obtain if i apply a xor-ing a one way function and it's input? 2012-12-04T18:24:57.147

4 A good introductory book on cryptography 2013-03-31T16:45:31.587

4 What happens to quantum algorithms such as BB84 if P=NP 2014-07-14T14:10:00.903

4 Partially homomorphic encryption (on addition modulo N) not based on prime factorization 2014-08-04T22:38:05.150

4 Computing modular exponent given order 2015-01-23T18:33:44.520

4 Why is it important to solve a problem in Polynomial time, In cryptography? 2015-04-15T18:34:11.243

4 Hardcore Bit proof for discrete log 2015-09-24T02:07:30.907

4 Encrypting a 180-bit plaintext into a 180 bit ciphertext with a 128-bit block cipher 2015-10-01T16:42:08.240

4 Do one way function exist? 2015-10-28T15:20:58.527

4 One-shot Private Randomness Extractor 2015-11-24T16:09:03.173

4 creating new PRF from existing one 2017-03-21T13:04:35.213

4 Blockchain cipher suitable for preschoolers 2018-03-07T04:10:55.527

3 Rigorous proof against pseudo random function 2012-10-18T00:40:36.627

3 Condition in Shamir Secret Sharing Scheme 2012-11-28T05:34:05.030

3 Assumptions of One Way Functions 2013-04-17T19:40:32.080

3 Perfectly Secure Ciphers known other than the OTP 2013-09-20T14:01:40.700

3 Iterative Byzantine consensus in directed graphs with unbounded malicious nodes 2014-06-23T17:23:28.197

3 What are the examples of the easily computable "wild" permutations? 2015-04-08T00:36:01.163

3 How is Chinese Remainder Theorem used in the proof of correctness for RSA 2015-06-01T14:21:37.420

3 If one-way functions exist are we definitely using them? 2015-06-24T17:04:51.823

3 "Most Similar Vector Problem" on an Integer Lattice 2015-07-31T01:16:17.017

3 Bijective algorithm(s) that can shuffle a range of numbers back and forth 2016-04-11T09:04:37.793

3 dining metaphysicians problem 2016-07-13T02:34:24.093

3 Do cryptographic hash function solve clustering problems with linear probing? 2016-12-16T20:50:44.267

3 Given a string, is it possible to determine which hashing algorithm has produced it, if any? 2016-12-30T18:02:03.417

3 Given the hash of a collection, H(X), can I build a proof that F(X) == Y, without having X? 2017-01-18T18:38:35.310

3 RSA Encryption Explanation 2017-02-03T01:13:02.800

3 Prove count without revealing data 2017-03-15T08:38:44.470

3 Indexing a random permutation 2017-10-26T00:29:23.863

3 Computation of discrete logarithm 2018-02-12T13:00:33.797

2 Mersenne twister middle word 2012-10-19T20:39:43.797

2 One time pad, get plaintext using ciphers encoded with the same key 2012-11-18T11:07:56.430

2 Collision resistant hash function 2013-01-13T18:21:29.690

2 Which areas in CS will be (or have been) most affected by fully homomorphic cryptography? 2013-06-08T20:17:49.197

2 Mealy machines to model ciphers 2013-08-17T19:55:32.487

2 Proof of correctness of the XL-algorithm for polynomial systems 2014-06-09T03:52:56.530

2 Is a very long plain text password harder to crack than a short complicated password? 2014-09-26T21:55:40.070

2 Hash values that are impossible to reach 2014-12-12T23:27:23.270

2 Formula for sufficiently lengthy encryption key? 2015-07-02T12:07:26.163

2 About the definition of "differential privacy" in communication complexity 2015-07-09T03:39:23.213