Is there a list of all the (most) assumptions (such as RSA and DDH assumptions) used in cryptography and the corresponding properties?
Asked
Active
Viewed 50 times
0
-
1We'll need a defined scope for this, otherwise, the list will grow infinitely. My suggestion would be key-establishment and digital signature schemes, and symmetric-key encryption and hash algorithms used in major Internet protocols such as SSH, SSL/TLS, QUIC, IPSec, IKE. If you think this is a good idea, please consider amending your post accordingly. – DannyNiu Mar 22 '23 at 11:03
-
2Maybe this post answers your question – Titanlord Mar 22 '23 at 13:25