Newest Questions
32,033 questions
0
votes
0
answers
2
views
Speculative Question on NSA total storage capacity
This is a speculative question that may be hard to answer reliably. Apologies.
According to a Techcrunch article linked here
A stunning report in Forbes today detailed that the NSA’s rapidly ...
3
votes
0
answers
46
views
A lifestyle-based example of simulation-based security
The intuition behind simulation-based security proofs comes from the following idea — if any party participating in a protocol or system can fully simulate the entire interaction process without ...
2
votes
0
answers
29
views
Hardcore Predicate for ECDLP
The 1999 paper "The Security of all RSA and Discrete Log Bits" by Hastad and Naslund here states that any block of $O(\log \log N)$ bits where $N=pq,$ of the encrypted RSA output is known to ...
2
votes
1
answer
107
views
What is the complexity of the Block Korkine-Zolotarev algorithm?
I want to know what is the complexity of the lattice-reduction algorithm (used agains CKKS encryption algorithm) named Block Korkine-Zolotarev (BKZ) algorithm (Curtis et al., 2019)?
ref: https://...
5
votes
1
answer
401
views
Provability of security for unbalanced Feistel ciphers?
Luby and Rackoff have shown that a balanced Feistel scheme requires only 4 rounds and is "perfectly" secure as long as the round functions are "random enough". Has any work been ...
2
votes
1
answer
189
views
Complexity of calculating Second Least Significant Bit in Discrete Log Problem?
Consider the discrete Log Problem w.r.t. prime $p$. Given $b, p, r$ find $x$ where: $b^x\bmod p=r$.
We are promised that $b^{\frac{(p-1)}2}\bmod p=p-1$.
Q1: What is the complexity of calculating the ...
2
votes
1
answer
95
views
In the IND-CPA game, is there an upper bound on the number of queries? [closed]
I'm working on a problem where an encryption scheme like OTP leaks the r-th bit of the key each query where r is a random integer. If an attacker can do an infinite number of queries before the ...
0
votes
0
answers
51
views
How do I display a file on a website and keep it encrypted when it's saved by the user?
My problem is specific: basically I want to have a website that is a gallery of my photos and I want the user to be able to view them, but that is the only access the user has. If they attempt to save ...
5
votes
0
answers
66
views
+50
Lattice construction for small integer root extraction in bivariate Coppersmith technique
I have a bivariate polynomial $f(x,y)\in\mathbb Z[x,y]$ of shape
$$f(x,y)=ax^2+bxy+cy^2+dx+ey+f$$
where
$abcdef\neq0$
$|x|<X$, $|y|<Y$, $XY<\frac{W^\frac12}{g(N)}$ where $W=\|f(xX,yY)\|_\...
1
vote
1
answer
194
views
I need to be able to calculate the initial value of a CRC-32/ISO-HDLC to give a CRC of 0 for an input of 0
As the question states I want to be able to find the initial value for different byte inputs to give a CRC of 0. I have some of the initial values but need others.
I/P = 0x00 INIT = 0x9bf1a90f
I/P = ...
3
votes
0
answers
40
views
Is it possible to create a useful hyperelliptic curve cover having Genus 2 for altbn254 or bls12-381?
I m looking for a way to perform pairings without final exponentiation or where the last step is easy to inverse (in order to perform pairing inversion through Miller inversion using https://eprint....
4
votes
1
answer
303
views
Is low Hamming weight problem comparably difficult as SIS?
Lattice-based schemes sometimes base their difficulty on the intractability of finding short solutions in under-determined linear systems. This assumes of course the underlying ring element is not bit-...
1
vote
0
answers
58
views
How to determine the algorithm used to generate a 48-byte header for encrypted files? [closed]
I am engaged in the translation of encrypted files. I have several files encrypted in the same way.
The files consist of two parts:
48 byte header example - ...
0
votes
2
answers
102
views
How to correctly convert Bitcoin’s double SHA-256 proof-of-work into a CNF satisfiability (SAT) problem? [closed]
Is there any respected mathematician who can correctly transform the double SHA proof-of-work (used in Bitcoin mining) into a satisfiability (SAT) problem, ensuring that the CNF conversion is done ...
0
votes
0
answers
37
views
Clarify whether a Beaver Triple is essentially a form of Functional Secret Sharing (FSS)?
Could you please clarify whether a Beaver Triple is essentially a form of Functional Secret Sharing (FSS)?
I feel that a Beaver Triple might be the key for the share of the multiplication function. If ...