Search code examples
Why is it recommended to make crypto algorithms public?...


securitycryptographyencryptioncryptanalysis

Read More
How do I recognise a string as Malbolge source code?...


cryptanalysismalbolge

Read More
What is the difference between a multi-collision and a first or second pre-image attack on a hash fu...


cryptographyhash-collisioncryptanalysiscryptographic-hash-function

Read More
How to add mathematical function as argument in python function...


pythonfunctioncryptanalysis

Read More
SHA256 Find Partial Collision...


algorithmcryptographycryptanalysis

Read More
How to find the prime factors of a number with python...


pythonencryptionrsaprimescryptanalysis

Read More
Do not understand the error I am receiving?...


pythonpython-3.xcryptographycryptanalysis

Read More
My cryptanalyis of an affine cipher isn't working 100% of the time...


pythonmodular-arithmeticcryptanalysis

Read More
Loop in an algorithm which is dependent on hex value...


calgorithmfor-loopcryptographycryptanalysis

Read More
How to implement modular exponentiation?...


pythonalgorithmpowmodular-arithmeticcryptanalysis

Read More
Trying to decrypt a PHP PseudoCrypt class...


phpmathhashbcmathcryptanalysis

Read More
What is velocity in particle swarm optimisation for cryptanalysis?...


javacryptographyparticle-swarmcryptanalysis

Read More
How key_derivation and key_verification functions are implemented of a 7-zip archive's encryptio...


encryptioncryptography7zippassword-recoverycryptanalysis

Read More
Is (number of picoseconds of CPU time used by the current program + clock time), a seed immune to cr...


encryptioncryptographyecdsacryptanalysis

Read More
How to find RC4 key from decrypted and encrypted data?...


ccryptanalysisrc4-cipher

Read More
Why DES is insecure? How do we know when to stop iterating and that we've found out the key?...


ccryptographycryptanalysis

Read More
generating 2^24 tables which differ only at one bit with c#...


c#binarycryptanalysis

Read More
Get the AES key from an encrypted file using an already decrypted version of the same file...


cryptographyaescryptanalysis

Read More
Is it possible to reverse engineer AES256?...


encryptioncryptographyaescryptanalysis

Read More
Security implications of storing the password hash along an encrypted AES key...


hashcryptographyaescryptanalysispkcs#5

Read More
repetition in encrypted data -- red flag?...


encryptioncryptographycryptanalysis

Read More
BackNext