Tag: implementation


Found 260 results for 'implementation'.


1) implementation - Sane implementations of Bitcoin cryptography routines w.r.t. side-channel attacks
2) implementation - How does DJB's nistp224 manage to fit compressed points into 224 bits?
3) public-key - How to avoid a chicken and egg scenario with encrypting passwords?
4) elliptic-curves - Applicability of RFC-6090 point doubling formula in homogeneous coordinates
5) public-key - Implementation of a decryption mixnet, and problems with the size of the key
6) public-key - What is the simplest digital signature algorithm known?
7) encryption - Custom crypto library in C
8) implementation - Is it possible to test implementation for side-channel attacks?
9) implementation - In ECDSA, how many field operations are used for signature verification?
10) elliptic-curves - Goofs that could creep in ECDSA signature verification?
11) elliptic-curves - Security model scalar multiplication in NaCl
12) encryption - Discrete Logarithm (512 bits numbers) - Find exponent parameter
13) elliptic-curves - Generating a random point on an elliptic curve over a finite field
14) implementation - ECDSA with common nonce?
15) elliptic-curves - Pohlig-Hellman and Shanks algorithm on ECC
16) implementation - Is LUKS Anti-Forensic information splitter (AFsplit) indistinguishable from random data?
17) hash - Right way to hash elliptic curve points into finite field
18) rsa - In RSA, how does the CPU deal with this huge modulus (8192 bits)?
19) elliptic-curves - How to securely map messages to points on an elliptic curve
20) elliptic-curves - Edwards / Montgomery ECC with Weierstrass Implementation?
21) elliptic-curves - Is there any "exception-free" coordinates system for Weierstrass curves?
22) elliptic-curves - How do I multiply a Twisted Edwards point in Montgomery space?
23) encryption - Does a public key absolutely need to be used to initiate an encrypted session?
24) elliptic-curves - How to determine whether a point is at infinity in homogenous coordinates?
25) elliptic-curves - C# implementation of curve25519 to ed25519 conversions
26) elliptic-curves - Wrong Miller's Weil Pairing implementation?
27) elliptic-curves - Implementation of ECC over binary field
28) implementation - EdDSA point encoding difference between documentation and implementation
29) encryption - What information should I send along with an AES ciphertext and is there any standard to do that?
30) hash - Expandable hash function
31) cryptanalysis - Webcam random number generator
32) implementation - Implement Google Adiantum else where?
33) encryption - Difference between Hardware implemented algorithm and software implemented one?
34) encryption - Two way encryption with random IV
35) random-number-generator - Are XOFs and KDFs more usable than DRBGs?
36) rsa - RSA Blind Signatures Secure Implementation
37) elliptic-curves - Can I use NaCl's scalar multiplication functions for Diffie Hellman Key Agreement?
38) encryption - El Gamal special construction
39) public-key - Ed25519 choice of private key implementation
40) implementation - How is the Swiss post e-voting system supposed to work, and how was it wrong?
41) elliptic-curves - How are Elliptic Curve private and public keys actually used to encrypt or sign data?
42) public-key - Are there any signature schemes for underpowered devices (8-bit microcontroller)?
43) aes - Can I simulate iterated AES-ECB with other block cipher modes?
44) implementation - Do people not care about side channel resistance?
45) implementation - How does Montgomery reduction work?
46) rsa - Any real world implementation using message recovery?
47) implementation - Are lookup tables safe when they fit in a cache line?
48) implementation - OpenPGP Public-Key Encrypted Session Key Packet Key ID generation
49) encryption - Decode & Verify Base64urlUInt-encoded RS256 Public Key from Google
50) public-key - Asymmetric encryption that is secure for (almost) any foreseeable future