Skip to main content

Explore our questions

7 votes
2 answers
537 views

Strength of AES when 32-bits of the 128-bit key are known?

2 votes
2 answers
523 views

Zero-knowledge proof that the exponents of a Pedersen commitment are not zero

0 votes
1 answer
56 views

Is Homomorphic Encryption constructed like a Header?

0 votes
0 answers
9 views

Modular binomial exponent manipulation and assumption of coprimality

2 votes
1 answer
260 views

Factor multi-prime RSA

3 votes
0 answers
37 views

Use of symmetric remainder (balanced mod) to eliminate branching in polynomial additions for lattice-based cryptography: prior art/known limitations?

1 vote
0 answers
17 views

Two related question on MQ cryptosystems

0 votes
0 answers
20 views

Is this PRF + nullifier + signature construction secure for one-time tokens in a non-currency setting?

1 vote
0 answers
59 views

What is the real philosophical (geometric) reason for using a (discrete) Gaussian distribution for errors in the LWE problem?

1 vote
1 answer
44 views

ML-DSA without lattice

4 votes
1 answer
265 views

Why doesn't Learning With Errors use pseudoinverses?

2 votes
1 answer
586 views

Why can't you reverse engineer a valid ML-DSA secret key from a public key?

0 votes
1 answer
81 views

Next Message Functions in MPC Protocol

1 vote
1 answer
122 views

Design a multi party Private Set Intersection protocol with unconditional zero-sharing

Browse more Questions