Newest Questions

2 votes
0 answers
47 views

I get a statistically close to random matrix $A$ and a trapdoor over $\mathbb Z_q^{n \times m}$ using a trapdoor preimage sampler. Lets say I want to sample a short preimage for some other matrix $U$ ...
woah's user avatar
  • 89
0 votes
0 answers
11 views

I have a question that needs answering. I am currently in the middle of changing careers and have some interest in the tech field. Earlier this year, I made a list of jobs/careers that I wanted to ...
Sky's user avatar
  • 1
2 votes
3 answers
271 views

I have read the Keccak team document about PRNG. When you hash with Keccak SHAKE the amount of random bytes you wish to return is unlimited, i.e. I can fetch() as ...
ojacomarket's user avatar
0 votes
4 answers
158 views

I'm a new student IT. I need to understand the typical digital signatures, such as DSS, DSA or other in e-commerce.
Jean Tinialaou's user avatar
2 votes
1 answer
60 views

Is there a way to generate a backup of a GnuPG private key (without encryption) using any kind of Secret Sharing (like Shamir's Secret Sharing Scheme)? The idea is getting something that can be ...
eloyesp's user avatar
  • 121
3 votes
1 answer
429 views

"In the third step of the Schnorr protocol, the prover's response takes the form $z=r+cx$. Why can't this form $z=cr+x$ work? I found these answers 1 and 2 are related to my questions However, ...
JACK GAO's user avatar
9 votes
2 answers
2k views

This is a speculative question that may be hard to answer reliably. Apologies. According to a Techcrunch article linked here A stunning report in Forbes today detailed that the NSA’s rapidly ...
kodlu's user avatar
  • 25.7k
5 votes
1 answer
131 views

The intuition behind simulation-based security proofs comes from the following idea — if any party participating in a protocol or system can fully simulate the entire interaction process without ...
DSTBP's user avatar
  • 321
4 votes
0 answers
59 views

The 1999 paper "The Security of all RSA and Discrete Log Bits" by Hastad and Naslund here states that any block of $O(\log \log N)$ bits where $N=pq,$ of the encrypted RSA output is known to ...
kodlu's user avatar
  • 25.7k
2 votes
1 answer
113 views

I want to know what is the complexity of the lattice-reduction algorithm (used agains CKKS encryption algorithm) named Block Korkine-Zolotarev (BKZ) algorithm (Curtis et al., 2019)? ref: https://...
John's user avatar
  • 31
5 votes
1 answer
423 views

Luby and Rackoff have shown that a balanced Feistel scheme requires only 4 rounds and is "perfectly" secure as long as the round functions are "random enough". Has any work been ...
b degnan's user avatar
  • 5,334
2 votes
1 answer
203 views

Consider the discrete Log Problem w.r.t. prime $p$. Given $b, p, r$ find $x$ where: $b^x\bmod p=r$. We are promised that $b^{\frac{(p-1)}2}\bmod p=p-1$. Q1: What is the complexity of calculating the ...
TheoryQuest1's user avatar
2 votes
1 answer
103 views

I'm working on a problem where an encryption scheme like OTP leaks the r-th bit of the key each query where r is a random integer. If an attacker can do an infinite number of queries before the ...
Rexurtiser Skyick's user avatar
0 votes
0 answers
59 views

My problem is specific: basically I want to have a website that is a gallery of my photos and I want the user to be able to view them, but that is the only access the user has. If they attempt to save ...
alan's user avatar
  • 1
6 votes
1 answer
166 views

I have a bivariate polynomial $f(x,y)\in\mathbb Z[x,y]$ of shape $$f(x,y)=ax^2+bxy+cy^2+dx+ey+f$$ where $abcdef\neq0$ $|x|<X$, $|y|<Y$, $XY<\frac{W^\frac12}{g(N)}$ where $W=\|f(xX,yY)\|_\...
Turbo's user avatar
  • 1,191

15 30 50 per page