Skip to main content

Explore our questions

1 vote
2 answers
147 views

Add/remove dealers

4 votes
0 answers
31 views

Are recent reductions in logical qubit counts for Shor's algorithm actually more feasible?

1 vote
1 answer
45 views

Semi-honest adversary's random tape in MPC simulation

2 votes
1 answer
2k views

gpg symmetric encryption decrypts without asking for the symmetric key when --decrypt option is used

2 votes
2 answers
217 views

Can a Successful lattice attack using MSBs be adapted to use LSBs instead?

9 votes
1 answer
1k views

Why is encrypting a key under itself dangerous?

1 vote
1 answer
162 views

BFV bootstrapping vs leveled scheme

17 votes
1 answer
1k views

Why does openssl only generate 2 5-bit primes?

1 vote
1 answer
103 views

How does the signature stripping attack in the encrypted key signing key transfer protocol work?

2 votes
4 answers
402 views

Is it possible to verify and relay an encryption key with a trusted but transparent third party?

2 votes
4 answers
10k views

19 out of 24 words of BIP39 passphrase (brute-force last 5?)

7 votes
1 answer
270 views

How to Force a Hash Sequence $\{H(m,i)\}_{i}$ to "Behave Randomly?"

2 votes
1 answer
1k views

Input size recomendation of sequence for each test in NIST SP 800-22

1 vote
1 answer
144 views

Verifier running polynomial commitment

Browse more Questions