Hacker News
- Is there a feasible preimage attack for any hash function today? https://crypto.stackexchange.com/questions/67059/is-there-a-feasible-preimage-attack-for-any-hash-function-no-matter-how-depreca 2 comments
- Why does my SSH private key still work after changing some bytes? (2016) https://crypto.stackexchange.com/questions/31807/why-does-my-ssh-private-key-still-work-after-changing-some-bytes-in-the-file 84 comments
- How easy is it in 2022 to find a SHA1 collision? https://crypto.stackexchange.com/questions/99767/how-easy-is-it-in-2022-to-find-a-sha1-collision 165 comments
- Apple's New CSAM Protections May Make iCloud Photos Bruteforceable https://crypto.stackexchange.com/questions/93423/how-unique-is-a-neuralhash 81 comments
- SHA-512 is 1.5x faster than SHA-256 on 64-bit platforms http://crypto.stackexchange.com/questions/26336/sha512-faster-than-sha256 13 comments
- Technical feasibility of decrypting https by replacing the computer's PRNG http://crypto.stackexchange.com/questions/9210/technical-feasibility-of-decrypting-https-by-replacing-the-computers-prng/9212 124 comments
- Why is elliptic curve cryptography not widely used, compared to RSA? http://crypto.stackexchange.com/questions/1190/why-is-elliptic-curve-cryptography-not-widely-used-compared-to-rsa 26 comments
- How is CipherCloud doing homomorphic encryption? http://crypto.stackexchange.com/questions/3645/how-is-ciphercloud-doing-homomorphic-encryption 12 comments
Lobsters
- Why do web-services tend to use preshared secret keys for client authentication instead of public keys? https://crypto.stackexchange.com/q/101827 13 comments cryptography , security
- SHA512 is faster than SHA256 on x86_64 http://crypto.stackexchange.com/questions/26336/sha512-faster-than-sha256 2 comments cryptography
- Question about the Approximate Modulus Switching in RNS CKKS https://crypto.stackexchange.com/questions/100340/approximate-modulus-switching-in-rns-ckks 3 comments crypto
- Looking of ideas of hash functions that are efficient on the λ-calculus https://crypto.stackexchange.com/questions/93823/what-is-an-efficient-cryptographic-hash-function-in-the-pure-affine-%CE%BB-calculus 12 comments haskell
- Help implementing a mental Skull protocol https://crypto.stackexchange.com/questions/77138/how-to-play-mental-skull 12 comments crypto
- What are possible Many Time Pad attacks if no spaces appear in the ASCII characters? https://crypto.stackexchange.com/questions/6020/how-to-attack-a-many-time-pad-based-on-what-happens-when-an-ascii-space-is-xor 11 comments crypto
- Ask Crypto: Revert cascaded AES encyption in one step? https://crypto.stackexchange.com/questions/61647/reverse-cascaded-aes-encryption 17 comments crypto
- Non interactive ZKP that encrypted additive elgamal message is in set of valid messages https://crypto.stackexchange.com/questions/59361/non-interactive-zkp-that-encrypted-additive-elgamal-message-is-in-set-of-valid-m/59370#59370 7 comments crypto
- TIL that brute-forcing a 256-bit key would cost about 10441044 times the world GDP. http://crypto.stackexchange.com/questions/1145/how-much-would-it-cost-in-u-s-dollars-to-brute-force-a-256-bit-key-in-a-year 141 comments programming
- 33c3ctf beeblebrox RSA Sign challenge: any tipps? http://crypto.stackexchange.com/questions/42696/33c3ctf-beeblebrox-rsa-sign-challenge-any-tipps 4 comments crypto
- Additive proof of discrete log? http://crypto.stackexchange.com/q/39695/26503 12 comments btc
- Explanation of cryptographic terminology for newbies http://crypto.stackexchange.com/questions/37186/salting-hash-stored-on-rfid-tag 14 comments crypto
- Recommended books for learning about cryptography? http://crypto.stackexchange.com/questions/2991/why-must-iv-key-pairs-not-be-reused-in-ctr-mode 9 comments learnprogramming
- Why the real Satoshi cannot access genesis private keys http://crypto.stackexchange.com/questions/606/time-capsule-cryptography 4 comments btc
- Which is/are the strongest known Fully Homomorphic Encryption scheme(s)? http://crypto.stackexchange.com/questions/30191/which-is-are-the-strongest-known-fully-homomorphic-encryption-schemes 6 comments crypto
- Using Skein as a stream cipher? https://crypto.stackexchange.com/questions/18478/skein-or-keccak-stream-cipher-construction 9 comments crypto
- Question: How Brittle Are LCG-Cracking Techniques?, Any Good Answers? http://crypto.stackexchange.com/questions/20495/how-brittle-are-lcg-cracking-techniques 12 comments crypto
- Shouldn't military radios (eg. SINCGARS, AN/PRC-152) be using asymmetric keys and not symmetric keys? The latter method seems silly, clunky, and insecure. (xpost from /r/amateurradio) https://crypto.stackexchange.com/questions/5782/why-is-asymmetric-cryptography-bad-for-huge-data 40 comments crypto
- I really liked the top response to this question: Best way to reduce chance of hash collisions: Multiple hashes, or larger hash? http://crypto.stackexchange.com/questions/1170/best-way-to-reduce-chance-of-hash-collisions-multiple-hashes-or-larger-hash 15 comments math
- Quantum computer goes online https://crypto.stackexchange.com/questions/15983/shors-algorithm-values 10 comments privacy
- Why do people/companies still trust AES for their crypto? http://crypto.stackexchange.com/questions/11104/how-exactly-was-the-finalist-chosen-in-the-nist-aes-competition 33 comments crypto
- NIST Advanced Encryption Standard (AES) process not so transparent after all? http://crypto.stackexchange.com/questions/11104/how-exactly-was-the-finalist-chosen-in-the-nist-aes-competition 3 comments privacy
- elliptic curves - Should we trust the NIST-recommended ECC parameters? http://crypto.stackexchange.com/questions/10263/should-we-trust-the-nist-recommended-ecc-parameters 8 comments technology
- Technical feasibility of decrypting https by replacing the computer's PRNG http://crypto.stackexchange.com/q/9210/2512 6 comments crypto
- Best way to reduce chance of SHA-256 hash collisions? http://crypto.stackexchange.com/questions/1170/best-way-to-reduce-chance-of-hash-collisions-multiple-hashes-or-larger-hash/1172#1172 13 comments crypto
- Does there exist any cryptographic algorithm which encrypts data in such a way that it can only be decrypted after a certain period of time? http://crypto.stackexchange.com/q/606/117 6 comments crypto
- Is modern encryption needlessly complicated? http://crypto.stackexchange.com/q/596/117 3 comments crypto
Linking pages
- Research Notes: AES-GMAC-CTR (SIV) – ZeroTier https://www.zerotier.com/aes-gmac-ctr-siv/ 59 comments
- Generare numeri casuali a partire dalle banane | by Valerio Nappi | Medium https://medium.com/@valerionew/generare-numeri-casuali-a-partire-dalle-banane-af8adea2e2a8 27 comments
- GitHub - samuel-lucas6/Cryptography-Guidelines: Guidance on implementing cryptography as a developer. https://github.com/samuel-lucas6/Cryptography-Guidelines 16 comments
- GitHub - sobolevn/awesome-cryptography: A curated list of cryptography resources and links. https://github.com/sobolevn/awesome-cryptography 15 comments
- The 5 steps to end-to-end encrypted photo storage and sharing | by Andrew Hill | Textile | Medium https://medium.com/textileio/the-5-steps-to-end-to-end-encrypted-photo-storage-and-sharing-45ad4aad6b14 12 comments