Cryptography Verifiable Delay Functions from Supersingular Isogenies and Pairings |
- Verifiable Delay Functions from Supersingular Isogenies and Pairings
- SaltShaker: Easily sign/verify/encrypt/decrypt messages with Nacl (tweetnacl) in Javascript. Also includes CryptoJS.
- Why do we use hashing algorithms without a security proof?
Verifiable Delay Functions from Supersingular Isogenies and Pairings Posted: 21 Feb 2019 12:15 AM PST |
Posted: 20 Feb 2019 04:20 PM PST |
Why do we use hashing algorithms without a security proof? Posted: 20 Feb 2019 03:01 AM PST It seems that no common hashing algorithm has a security proof - we simply rely on there being no known way to break their security claims. History has shown we are usually wrong (MD5, SHA1). Instead, can't one make a provably secure hashing algorithm from a public-private key crypto scheme as follows:
[link] [comments] |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment