StackRating

An Elo-based rating system for Stack Overflow
Home   |   About   |   Stats and Analysis   |   Get a Badge
Rating Stats for

Thomas Pornin

Rating
1621.47 (1,063rd)
Reputation
63,417 (1,412th)
Page: 1 2 3 4 ... 11
Title Δ
How to securely generate an IV for AES CBC Encryption? 0.00
How do I zero-ise a secret key in java? +0.05
how do I compile the asm generated by gcc +0.56
Can you show me two actual, non-trivial strings that produce the sa... 0.00
encrypting an email using an EC X509 certificate -0.67
Convert Java to python DSA signing +1.55
How long does SHA-1 take to create hashes? -1.89
Should I store my salt along with my hashed password in the database? -1.01
why does ssl's ciphersuite contain authentication algorithm? -0.53
An RNG faster than /dev/random but cryptographically useful? +1.22
How many string characters should I read to get a good hash? +1.83
java.security.InvalidKeyException: Illegal key size +0.29
md5 hash collisions. +0.87
What hash function should to hash an ordered list of numbers? 0.00
Calculating SHA-1 hashes in Java and C# 0.00
How is bcrypt more future proof than increasing the number of SHA i... +1.09
RSA - Can you create a public key from a private key? +0.57
Issues with SHA1 hash implementation in Android +0.45
8086 Assembly question, what does this code do +0.07
How many iterations of Rabin-Miller should I use for cryptographic... +0.99
Signing a byte array of 128 bytes with RSA in C sharp +1.18
Play! hash password returns bad result -0.66
Injecting code into executable at runtime -1.26
Which symmetric key algorithm does SSL use? -1.25
To study SPARC executable structure with OpenSolaris on Intel -0.13
How is revocation of a root certificate handled? -0.15
Random characters when retrieving private/public KEY (OpenSSL) from... 0.00
Should I accept an OSCP responder certificate signed by the trust a... 0.00
Are RSA signatures unique? +1.11
Equivalent of rdtsc opcode for PPC +0.27
Univocal hash function for a string 76 chars long -2.52
RSA Encryption Problem [Size of payload data] +0.33
What's the most computationally expensive step in a SSH2 session? 0.00
What SSL cipher suite has the least overhead? +0.34
Locking data for x days +0.37
Do I change salt value when changing a user password? +0.30
Why doesn't having the code to the MD5 function help hackers break... +1.57
When using AES, is there a way to tell if data was encrypted using... -2.40
Secret vs. Non-secret Initialization Vector +1.52
RSA Encryption with given public key (in Java) +0.93
Mapping function -0.19
Find $secret in $a == md5($b . $secret) -0.09
Given a hashing algorithm, is there a more efficient way to 'unhash... +0.47
Is Padding Oracle Attack possible with always 200 OK response +1.30
How do I hash an integer into a very small string? +0.55
Is cryptography restricted by users? 0.00
How does a reduction function used with rainbow tables work? -0.05
Can someone explain the assembly code please? 0.00
Cryptography and Authentication via TLS with Web of Trust in Java -0.67
Cryptography : Generation of RSA Private Key Using Modulus & Ex... 0.00