-
Advantages:
- ~~avoid the malleability problem with ECDSA signatures~~
- avoid side-channel attacks on signing
- avoid attacks on ECDSA based on not-perfectly-random nonces
- reduce reliance on collis…
daira updated
5 years ago
-
If you define a new MGF-V then there is a new function that is called – which code should potentially be setup for – and zero extra work beyond that. The size of the mask is the size of the output, no…
-
Hi,
First of all, what a great set of algorithms you guys have in this library, I use them a lot!
I am now using your chacha engine in a project together with poly1305 for AEAD-chacha20-poly1305 enc…
wzoet updated
6 years ago
-
Message Digests - are the limits on the size only for CMS or do they apply
everywhere that the algorithm is used. If it is everywhere how do we
reconcile with the usage in RSA-PSS?
-
The following page gives a list of safe curves to use with ECC:
http://safecurves.cr.yp.to/
As far as I can see, Crypto++ doesn't currently implement any of the safe curves listed on that page (e.g.…
-
Is the "new" argon2di mode supported, too?
-
EdDSA is a public-key digital signature system, instantiated with common parameters as Ed25519 and Ed448. It would be nice to have this implemented in OpenSSL, both at the crypto API level and at the…
-
Hi,
Was checking CMS utility source code.
Saw that there are around 12 ciphers(and 4 wrap ciphers) that are currently supported by CMS.
I could not find any list of CMS supported algorithms from …
-
Backend clients ought to be able to implement their own dynamic challenge-response-authorization (CRA) schemes on top of the dynamic ticket-based authorization scheme.
The only piece currently miss…
ecorm updated
5 years ago
-
Hi!
Here: https://github.com/keepassxreboot/keepassxc/blob/develop/src/crypto/kdf/Argon2Kdf.cpp#L170
Argon2_d is used, but the RFC draft recommends Argon2id:
https://datatracker.ietf.org/doc/draf…