StackRating

An Elo-based rating system for Stack Overflow
Home   |   About   |   Stats and Analysis   |   Get a Badge
Rating Stats for

Thomas Pornin

Rating
1621.47 (1,063rd)
Reputation
63,417 (1,412th)
Page: 1 2 3 ... 11
Title Δ
Java: Recover the Public Key by only having the PrivateKey? Possible? 0.00
Repeated set of UUIDs from java's UUID.randomUUID() 0.00
Base64url encoded representation puzzle 0.00
Is it possible to overwrite %eax using buffer overflow? +0.85
Parsing an X509 Certificate 0.00
Is this encryption method secure? 0.00
Elliptic Curve with Digital Signature Algorithm (ECDSA) implementat... +0.86
Accessing X509 Certificate Extension Fields in OpenSSL -0.17
Should output be encoded at the API or client level? +0.94
Segmentation fault on mcrypt (probably something to do with the buf... 0.00
Is XXTEA a good encryption algorithm for a PIC microcontroller? 0.00
pbkdf2_hmac_sha1 with empty salt to set aes key 0.00
How to calculate point addition using jacobian coordinate-system ov... -2.44
Operating Systems can run on multiple processors? +1.62
Java socket output stream -0.63
C if statement with && - Which function will execute first? -1.20
Which hash algorithm can be used for duplicate content verification? -2.07
How can I get the private key from an RSA public key? +0.33
Power of X Calculation On Ubuntu (10.4) -1.17
Digital signature public key -0.40
Efficient calculation of nth item in a random permutation -0.90
Windows CNG ECDH Secret Agreement structure 0.00
what would ideal password hashing algorithm look like? +1.24
x86 cr3 and linux swqpper_pg_dir -0.80
Double hash before parameter in function call +1.73
general protection in a custom OS +0.34
Microsoft RSA CSP key size +1.49
Get the Stack Pointer in C on Mac OS X Lion -2.42
About hash table 0.00
Java memory usage of simple data structure -0.56
Speed up encryption/decryption? +0.83
Would this be considered absurd for password hashing? +0.96
Do I need to know assembly to debug programs written in C? +1.04
Bcrypt - How many iterations/cost? -0.29
Benchmarking symmetric and asymmetric cryptography -0.24
Using RSA for hash +1.13
Changing the hashing function on a pre-existing database 0.00
is there a way to reverse a hash without rainbow tables? +0.14
How do I cipher plaintext using ECDH? 0.00
High quality, simple random password generator +0.78
How does bcrypt keep up with Moore's law? 0.00
SSL: If you use 2048 bit RSA key will the symmetric key that is neg... +0.49
Is it possible to recover a RSA public key from a byte[] array of p... 0.00
Should I prefer hash algorithms with longer outputs for storing pas... +0.79
512 bit hash vs 4 128bit hash -0.17
Verify signature using elliptic curve cryptography +0.33
What is the maximum number of SHA-1 hashes? +0.31
characteristics of various hash algorithms? -1.27
Need an HMAC-SHA1 implementation for C# Micro Framework -2.57
Using SuperFastHash instead of CRC32? -1.58