Tag: sha-256
Found 290 results for 'sha-256'.
1) sha-256 - ECDSA with SHA256 and sepc192r1 curve: Impossible, or how to calculate $e$?
2) implementation - Sane implementations of Bitcoin cryptography routines w.r.t. side-channel attacks
3) sha-256 - How to deal with collisions in Bitcoin addresses?
4) sha-256 - Would SHA-256(SHA-256(x)) produce collisions?
5) aes - AES-256 mode with per-block-key being a SHA-256 of SHA-256 of secret key, random public salt and block number. What's amiss?
6) hash - Hash length extension attack - SHA256 to 512 - impossible, correct?
7) rsa - Are RSA-SHA256 signatures prone to length extension attacks?
8) hash - Would possessing a string with the SHA-256 hash of all zeros lead to an attack on SHA-256?
9) aes - AES + CBC encryption for a stream of UDP packets
10) hmac - Using HMAC-SHA256 with short passwords and sliced outputs for short-lived secure hashing
11) hmac - How does the HOTP dynamic truncation function generalize to longer hashes?
12) elliptic-curves - Understanding example of ECDSA P256
13) hash - Do identical strings always have the same SHA-256 value?
14) hash - Prove that you have the data when hash is public
15) hash - Security levels in NIST Post-quantum project: e.g. AES-128 vs SHA-256
16) hash - What gives SHA-256 its preimage resistance?
17) sha-256 - Question regarding multiple SHA-256 rounds on a Bitcoin Brain Wallet passphrase…
18) sha-256 - How to pad a 448 bit message for SHA256?
19) hash - $2^{64}$ versions of the same message
20) hash - The difference in size between ECDSA output and hash size
21) hash - Why does SHA2-224 use different IV's than SHA2-256?
22) hash - Entropy preservation through cryptographic hash function
23) sha-256 - Can two files/strings have the same SHA-256 value?
24) brute-force-attack - SHA-256: (Probabilistic?) partial preimage possible?
25) hash - "Weaknesses" in SHA-256d?
26) cryptanalysis - If you wrote a reversible SHA-256 algorithm, how many "metadata" bits would be required for reversability?
27) protocol-design - SHA-256-based stream cipher
28) random-number-generator - Is SHA-1 secure when used to implement a PRNG
29) hmac - HMAC SHA256 for deriving session keys using random nonce
30) encryption - Using an AES-256-GCM key as a salt to SHA-256
31) hash - How is input message for SHA-2 padded?
32) sha-256 - Finding the IV values of SHA-256 given all message blocks
33) hash - How can I hash an input into an arbitrary domain point?
34) stream-cipher - Hash based stream cipher where the input is a constant, key, nonce and counter
35) sha-256 - Is it possible to derive the midstate of a sha256 hash?
36) hash - Should I calculate SHA-256 hash of a raw bytes of a token or it's hex encoding?
37) rsa - Why is data signed with SHA256-RSA-PKCS and digest signed with RSA-PKCS different?
38) rsa - Does the signature length of RS256 depend on the size of the RSA key used for signing?
39) encryption - Can RSA signing be implemented on top of RSA encryption/decryption?
40) encryption - Risks of Using SHA1 Instead of SHA256 for RSA with OAEP Padding
41) aes - What should I use for consequent AES key derivation?
42) hash - Use slow hashing to reduce digest size?
43) rsa - Is padding of the digest needed in SHA256 with RSA-2048 scheme?
44) rsa - Is it possible to retrieve the original hash of a digital signature using a public key?
45) hash - If a new hash function were made that simply truncated sha-256 to the first N bits, how much insight would it provide into sha-256?
46) hash - Is it possible to guarantee a SHA-256 hash will begin with a certain 3 bytes?
47) hash - How can I calculate the SHA-256 "midstate"?
48) hash - Are there any well-known examples of SHA-256 collisions?
49) hash - How can uniformity of hash functions (e.g. SHA-256) be proved?
50) hash - Minimizing exchanges for ZK proof of a message with given SHA-256