Skip to main content
9 events
when toggle format what by license comment
Oct 9, 2020 at 22:17 history edited kelalaka
edited tags
Jun 17, 2014 at 20:31 comment added Perseids @CodesInChaos: Very interesting application… Regarding the discussion there: I'm torn between arguing that this property is not at all a weakness of the implementation and that relying on such notion would be the fault of the protocol (similarly as I would see non-malleability as an unreasonable requirement of a signature scheme). And on the other hand I see the length extension property of the SHA2 family as a weakness and struggle to justify why this property is any different to it and why signature schemes shouldn't also be build as strongly as possible.
Jun 17, 2014 at 14:38 comment added CodesInChaos Discussion of the effect of weak points on Ed25519 signatures It's possible to forge messages that crypto_sign_open verifies if the public key is zero
Jun 15, 2014 at 22:09 history edited Perseids CC BY-SA 3.0
Fixes embarassing typo in the title.
Jun 15, 2014 at 21:40 vote accept Perseids
Jun 15, 2014 at 0:44 answer added Samuel Neves timeline score: 11
Jun 14, 2014 at 22:27 history tweeted twitter.com/#!/StackCrypto/status/477940541942804480
Jun 14, 2014 at 14:58 history edited Perseids CC BY-SA 3.0
Add explanation why only the subgroups of order 8 and 4 should be interesting.
Jun 14, 2014 at 14:48 history asked Perseids CC BY-SA 3.0