Tag: cryptanalysis


Found 719 results for 'cryptanalysis'.


1) cryptanalysis - How to attack a two time pad if the plain text is randomized?
2) public-key - Safety of DSA key parameters sharing
3) rsa - Given enough RSA signature values, is it possible to determine the public key value?
4) cryptanalysis - Does Curve25519 only provide 112 bit security?
5) public-key - Public-Key Encryption with Privilege Access: is it possible?
6) cryptanalysis - How much computing resource is required to brute-force RSA?
7) elliptic-curves - Verify that a point belongs to secp256r1
8) encryption - Is it theoretically possible to create an unbreakable cipher?
9) cryptanalysis - What does a "real" quantum computer need for cryptanalysis and/or cryptographic attack purposes?
10) cryptanalysis - Is this a secure PRG or not?
11) cryptanalysis - How does one attack a two-time pad (i.e. one time pad with key reuse)?
12) cryptanalysis - Can I make a PRNG that is secure even when state can be modified by user?
13) cryptanalysis - Is this simple PRNG secure?
14) cryptanalysis - How to construct a next bit predictor from a distinguisher
15) cryptanalysis - Is it possible to find a Mersenne Twister seed given only the first output?
16) cryptanalysis - Is DSA still secure without the factor "r"?
17) cryptanalysis - How does the MOV attack work?
18) cryptanalysis - How does a chosen plaintext attack on RSA work?
19) rsa - Breaking RSA, given a special kind of oracle that decrypts related ciphertexts for us
20) cryptanalysis - Generating child keys for a hill climb algorithm
21) cryptanalysis - Do recent announcements about solving the DLP in $GF(2^{6120})$ apply to schemes proposed for cryptographic use?
22) rsa - What do recent announcements about solving the DLP in $GF(2^{6120})$ mean for RSA
23) rsa - Which attacks are possible against raw/textbook RSA?
24) encryption - Given enough RSA ciphertext, is it possible to determine which key was used?
25) rsa - Precomputation attacks on RSA
26) encryption - Can zkSNARK or other zero-knowledge proofs be used to proof message authenticity without revealing private key?
27) aes - How does AES bit security increase by round?
28) cryptanalysis - Small subgroup confinement attack on Diffie-Hellman
29) cryptanalysis - Breaking variations of Linear Congruential Generators
30) elliptic-curves - How to determine secp256r1 or secp256k1 is used on the web sites
31) cryptanalysis - Is it possible to generate backdoored DH parameters?
32) rsa - Is javascript RSA signing safe?
33) cryptanalysis - How to forge Schnorr signatures if you can guess the challenge
34) encryption - Why multiple homomorphic operations on a ciphertext leaks no information about the plaintext?
35) aes - How do we prove that AES, DES etc. are secure?
36) aes - Hypothetical unknown cipher - security in obscurity?
37) rsa - Exposed raw RSA private key operation
38) cryptanalysis - Difference between cryptanalysis and brute force attacks
39) cryptanalysis - Paillier estimate attack costs on short keys
40) hash - Proof for the SHA3 claim that 256 bit security is "post-quantum sufficient"?
41) encryption - Message Expansion / Encryption Blowup Factor / Ciphertext Expansion of ECC
42) rsa - Security strength of RSA in relation with the modulus size
43) cryptanalysis - At what modulus size does the logjam reduction stage become impractical?
44) cryptanalysis - Logjam-style attack on Factoring?
45) cryptanalysis - Weakness of SRP after server compromise
46) encryption - What is the easiest encryption/cipher to brute force?
47) cryptanalysis - AES-CTR vulnerability to cryptographic oracle
48) aes - What are the implications of a non “constant time” implementations on trusted systems in a non-network scenario?
49) cryptanalysis - Applicability of IBM's projected 50-qubit quantum computer Q to cryptanalysis?
50) cryptanalysis - What informal indicators exist for estimating the computational infeasibility of cryptographic problems?