Questions tagged [resources]

Resources are material that can be referenced for further information on cryptography.

Resources are material that can be referenced for further information on cryptography.

18 questions
7
votes
2 answers

Is there a complete summarized list of attacks on Diffie-Hellman?

Is there a complete summarized list of attacks on Diffie-Hellman? For RSA, there is this paper by Boneh, so I was wondering whether there is such a list for attacks on DHKE. I have been looking everywhere. Surprisingly, I can't find one. Could you…
Michael Blane
  • 211
  • 2
  • 5
6
votes
1 answer

Hermitian curves introductory references

Could you give me some reference to start on Hermitian Curves. Some papers or textbooks would be perfect, and please mention if it's math inclined or comp.sci. inclined. I've only seen hermitian curves in coding theory but if you know of…
Vicfred
  • 441
  • 2
  • 6
  • 13
5
votes
1 answer

Sites to find crypto intermediate values

Does anyone know of any sites where intermediate values of multiple crypto algorithms (not just the famous ones), including hashes, can be found? I don't just mean intermediate values of encrypting. I'm also looking for intermediate values of the…
calccrypto
  • 536
  • 1
  • 9
  • 26
4
votes
3 answers

Where can I find useful data for cryptography/coding theory?

When implementing cryptographic/coding theory algorithms one need to use data like big prime numbers, numbers in $Z_n$ and their inverses, irreducible polynomials in $Z_n[x]$ and so on... While sometimes it is easy to write a simple program to get…
Vicfred
  • 441
  • 2
  • 6
  • 13
4
votes
3 answers

Comparison: complexity measures vs. security

Assume that you want to compare several cryptographic primitives (say, encryption schemes), and choose one. You need to consider several complexity measures, such as the key length, encryption time, decryption time, etc. In order for the comparison…
3
votes
1 answer

Estimating difficulty of "Memory-Hard Proof-of-Work" based on "size of memory"?

In Bitcoin proof-of-work, the difficulty of Proof-of-Work is estimated and calculated based on total hashing power of the participants. If total hashing power of the participants is higher, then PoW is more difficult. If we use a…
Questioner
  • 211
  • 1
  • 8
3
votes
3 answers

Frequency tables for HTML page source

Are there online resources with an ASCII character frequency table for HTML? There's tons of them for english, but I can't seem to find one for page source. I know that this is something that's likely to vary from site to site, but surely there's…
Craig Gidney
  • 496
  • 3
  • 7
2
votes
0 answers

Detailed running time analysis for Shamir secret sharing scheme

I am successfully working on Shamir's secret sharing scheme for few months. But the only issue I am facing is the calculation of theoretical time complexity. Since I am from algorithmic background, I am unaware of the time complexities of the…
2
votes
0 answers

Is there a complete summarized list of attacks on elliptic curve cryptography?

Is there a complete summarized list of attacks on elliptic curve cryptography? In RSA, there is https://crypto.stanford.edu/~dabo/papers/RSA-survey.pdf, so I was wondering if there is such a list somewhere. I have found many online resources for…
Michael Blane
  • 211
  • 2
  • 5
2
votes
2 answers

Is it possible to prove that I have half a key to decrypt file, to someone who has other half, without disclosing my part?

Is it possible to prove that I have half a key to decrypt file, to someone who has other half, without disclosing my part? Or better yet, could you suggest a place where I can read about solved and unsolvable practical cryptographic problems like…
Piotr
  • 123
  • 4
2
votes
0 answers

Simplicity and precision in cryptography papers

I know a PhD student who recently had his paper on applied cryptography rejected because one the reviewers claimed that it was "the solution was too simple and the notation used was more than necessary". It was accepted by the second reviewer.…
petro444
  • 125
  • 6
1
vote
0 answers

Where can I find the source of the Coppersmith method univariate in C with GMP library?

Could someone please tell me where I can find the source code of the Coppersmith method univariate written in C with the GMP library? to be fair I will explain how I will use it for…
1
vote
1 answer

Algorithm for anonymous but associated communications from a set of verified communicants?

Let's say that I'm selling a product, and I want to get authentic feedback from my customers. However, I have the following two constraints: My customers must be able to give [at least some of] their feedback anonymously (and, due to practical…
1
vote
1 answer

Any good links to learn the maths behind AES?

I'm creating an academic poster for my EPQ on the mathematics of cryptography. I would like to do a section on AES, however, I am struggling to find good resources to understand the maths. I have watched the computerphile video on AES but it…
Ozzy Kids
  • 25
  • 1
  • 4
1
vote
0 answers

Freely available softwares for simulating/implementing MPC protocols

I have been designing multiparty computation (MPC) protocols for functions that interest me. Although theoretically I am able to deduce the asymptotic complexity of the protocol, I wish to know as to how this protocol will perform for practical…
1
2