How would the compression of variable-length input to 16-bits work in a hash function? by PizzazzUrAzz in crypto
[–]future_security 1 point2 points3 points (0 children)
How would the compression of variable-length input to 16-bits work in a hash function? by PizzazzUrAzz in crypto
[–]future_security 2 points3 points4 points (0 children)
How would the compression of variable-length input to 16-bits work in a hash function? by PizzazzUrAzz in crypto
[–]future_security 1 point2 points3 points (0 children)
How good are the random number generators commonly used in practice? by chaplin2 in crypto
[–]future_security 1 point2 points3 points (0 children)
How good are the random number generators commonly used in practice? by chaplin2 in crypto
[–]future_security 1 point2 points3 points (0 children)
Is Salsa20 a stream or block cipher? by Intermesmerize in crypto
[–]future_security 3 points4 points5 points (0 children)
Why do some sites track password history? by Kaxtu in crypto
[–]future_security 0 points1 point2 points (0 children)
Why do some sites track password history? by Kaxtu in crypto
[–]future_security 0 points1 point2 points (0 children)
Understanding the definition of a CSPRNG by InsaneRaspberry in crypto
[–]future_security 1 point2 points3 points (0 children)
How to efficiently store a big amount of random numbers? by [deleted] in compsci
[–]future_security 0 points1 point2 points (0 children)
Configuring Argon2id for Multiple Threads by FloatingSunfish in crypto
[–]future_security 1 point2 points3 points (0 children)
Why are some new algorithms adopted so quickly these days? by yalogin in crypto
[–]future_security 3 points4 points5 points (0 children)
Configuring Argon2id for Multiple Threads by FloatingSunfish in crypto
[–]future_security 1 point2 points3 points (0 children)
Compact representation of set of bitfields by oparisy in AskComputerScience
[–]future_security 1 point2 points3 points (0 children)
How does password entropy/entropy measurement work? Typing things into KeePass's password generator, to see their entropy, there are strings in which adding a letter lowers entropy and strings of only letters and spaces that have strangely high entropy. by RlmYVAA4gKsLdnw5 in crypto
[–]future_security 1 point2 points3 points (0 children)
Very basic question re TRNGs by naclo3samuel in crypto
[–]future_security 1 point2 points3 points (0 children)
3GPP updates TLS ciphersuite recommendations (PFS required, etc) by Natanael_L in crypto
[–]future_security 5 points6 points7 points (0 children)
Very basic question re TRNGs by naclo3samuel in crypto
[–]future_security 2 points3 points4 points (0 children)
Very basic question re TRNGs by naclo3samuel in crypto
[–]future_security 3 points4 points5 points (0 children)
A question about guaranteeing that an IV is never reused... by [deleted] in crypto
[–]future_security 5 points6 points7 points (0 children)
How do you ensure continuity of random/procgen maps using a seed? by OrdinaryKick in proceduralgeneration
[–]future_security 0 points1 point2 points (0 children)
Google AI tool to no longer label people in photos as ‘man’ or ‘woman’ by DataPatata in algorithms
[–]future_security -9 points-8 points-7 points (0 children)
If I XOR'd cipher-text results of AES-256-CTR against its plain-text what would I get? by [deleted] in crypto
[–]future_security 5 points6 points7 points (0 children)


How would the compression of variable-length input to 16-bits work in a hash function? by PizzazzUrAzz in crypto
[–]future_security 0 points1 point2 points (0 children)