StackRating

An Elo-based rating system for Stack Overflow
Home   |   About   |   Stats and Analysis   |   Get a Badge
Rating Stats for

Accipitridae

Rating
1537.48 (13,148th)
Reputation
3,030 (55,802nd)
Page: 1 2
Title Δ
Derivation of IV for CBC Chaining Mode +4.37
Finding a minimum number of transformation +2.18
Calculating vs. lookup tables for sine value performance? -1.41
Three-way authentication/handing an authenticated client off to a d... +4.13
What are the chances that two messages have the same MD5 digest and... -3.67
Inserting encrypted password using RSACryptoServiceProvider class i... -4.49
What is O value for naive random selection from finite set? +3.03
Simple (to code) secure hash function +1.52
Encryption with Python -4.46
authentication token is encrypted but not signed - weakness? +0.23
SSL authentication by comparing certificate fingerprint? +4.02
AES output, is it smaller than input? +1.15
Encrypt a string using a public key -0.37
What are the important points about cryptographic hash functions? +0.62
Calculating phi(k) for 1<k<N -1.22
How do I encrypt a string and get a equal length encrypted string? -3.50
Picking a bounded uniform random value in GF(2^M) without exponenti... +3.68
Way to encrypt a single int -1.99
'Bad Data' When decrypting messages using DES3 -1.47
Inverse of A*X MOD (2^N)-1 +3.92
Expression Simplification +4.44
How do I get started using BouncyCastle? -2.54
Cracking a N bit RSA modulo numbers -0.09
Project Euler Problem 245 -0.05
Why are SSL certs self-signed if they have no real signature -3.87
Could validationKey and decryptionKey be found by brute force from... 0.00
How can I encrypt/decrypt 12-digit decimal numbers to other ones, u... +2.74
Man in Middle attack - Can such an attack occur if symmetric keys a... -1.99
Check if a number is divisible by 3 +1.58
Large buffers vs Large static buffers, is there an advantage? -1.43
authentication method -0.24
Line intersection +2.10
Does the security of Skein as a hash imply the security of Threefis... +4.23
Generate a commutative hash based on three sets of numbers? +0.21
Does any published research indicate that preimage attacks on MD5 a... +4.21
Is MD5 less secure than SHA et. al. in a practical sense? -0.27
Interview question: f(f(n)) == -n 0.00