qASK
Join Log in
  • Ask
  • Users
  • NB_1907

NB_1907 profile

NB_1907 avatar
NB_1907
Liked/Diskliked
23 2
Favorite Category: #Crypto
Reputation: 32
Registered: 1 year 4 mons
Location:
us flag
Des Moines, United States

About

I am a beginner in cryptography that's all...

Questions asked by NB_1907

  • Factoring 2048-bit integer with quantum computer?
    5/19/23, 10:25 AM
    Score:5
    public-key quantum-cryptanalysis quantum-computing
  • Post-quantum algorithms and side channel attacks
    3/9/23, 11:38 AM
    Score:5
    side-channel-attack post-quantum-cryptography
  • What is reaction attack?
    3/16/23, 12:57 PM
    Score:2
    public-key side-channel-attack terminology
  • What is the current situation of quantum computers?
    2/12/23, 12:39 PM
    Score:2
    quantum-computing
  • Timing attacks: Symmetric vs Asymmetric Algorithms
    4/3/23, 12:53 PM
    Score:1
    public-key side-channel-attack timing-attack symmetric
  • Under which conditions certificate is required for IKEv2?
    10/9/22, 1:17 PM
    Score:1
    key-exchange ipsec
  • $t'$ parameter in XSL Attack
    7/21/23, 7:10 AM
    Score:0
    algebraic-attack symmetric
  • Are the shares of Shamir secret sharing uniformly distributed random numbers?
    1/7/23, 1:26 PM
    Score:0
    secret-sharing
  • What are the explicit usage of different keys derived from SKEYSEED in IKE?
    11/7/22, 11:07 PM
    Score:0
    keys key-exchange
  • Why pre-shared key is not involved to key derivation in IKEv2?
    11/7/22, 1:20 PM
    Score:0
    post-quantum-cryptography key-exchange
Categories
  • Drupal (2302)
  • Crypto (2598)
  • Ubuntu (21514)
  • Server (14288)
Tags
#encryption #hash #public-key #elliptic-curves #rsa #aes #signature #zero-knowledge-proofs #post-quantum-cryptography #block-cipher #provable-security #diffie-hellman #discrete-logarithm #decryption #symmetric #multiparty-computation #keys #secret-sharing #cryptanalysis #pseudo-random-generator #homomorphic-encryption #lattice-crypto #collision-resistance #algorithm-design #authentication #attack #randomness #sha-256 #key-derivation #dsa
qASK
  • Ask question
  • Help
Categories
  • Drupal (2302)
  • Crypto (2598)
  • Ubuntu (21514)
  • Server (14288)
Info
  • Privacy Policy
  • Purpose of the site
  • Contact Us
  • About Us
Contacts
2023 © qASK.org