Skip to main content

Explore our questions

2 votes
1 answer
172 views

Combining CP-ABE and KP-ABE by wrapping one with the other?

2 votes
1 answer
2k views

About the Algebraic Normal Form (ANF) of S-Box in DES

2 votes
1 answer
132 views

Defining where the Module-SIS solution lies

1 vote
1 answer
78 views

2D variant of packed Shamir secret sharing

0 votes
0 answers
48 views

Does this key-derivation construction achieve context-isolated leakage resilience, and is passphrase rotation secure?

2 votes
0 answers
29 views

Why ABY3 achieves 4k communications in semi-honest setting and 11k communications in malicious setting?

2 votes
1 answer
366 views

Which encryption technique should be adopted to keep the search functionalities?

1 vote
1 answer
82 views

Definition of UC security

8 votes
1 answer
822 views

Zero knowledge proof for Paillier addition under multiple keys

2 votes
1 answer
255 views

Can you sign messages using Wireguard's keys?

0 votes
1 answer
127 views

Ring Signature's "solve for y_s" step in Rivest et al.'s "How to leak a secret"

1 vote
1 answer
194 views

Does encrypting a billion short and similar jsons with known structure make encryption less secure?

3 votes
1 answer
157 views

Interactive proof of possession of a signed message

1 vote
0 answers
38 views

How is ZKSTARK / FRI secure for small delta?

Browse more Questions