StackRating

An Elo-based rating system for Stack Overflow
Home   |   About   |   Stats and Analysis   |   Get a Badge
Rating Stats for

Thomas Pornin

Rating
1621.47 (1,063rd)
Reputation
63,417 (1,412th)
Page: 1 2 3 4 5 6 ... 11
Title Δ
varargs works in mips 0.00
How to read a private key? 0.00
Using a constant IV with single-block encryption +1.38
Fileformat for EC public/private keys? 0.00
Jump into the middle of instruction - in IA-32 -0.99
Question regarding RSA certificates and Oauth 0.00
Exporting RSA key object to XML in Java +1.27
RSA calculating c^d mod n -0.56
Faster way to find the correct order of chunks to get a known SHA1... +0.11
Can buffers in RSA_private_decrypt/RSA_public_encrypt overlap? 0.00
is it possible to retrieve a password from a (partial) MD5 hash? -0.15
What strings are allowed in the "common name" attribute i... 0.00
Can RSACryptoServiceProvider (.NET's RSA) use SHA256 for encryption... +0.96
Difference between word size and clock speed? +0.94
When using RSA algorithm, is it a risk if plaintext and its ciphert... -2.50
Encryption: Testing that a string is properly decrypted? +2.24
Blowfish in the Merkle–Damgård construction? +1.90
Best encryption for large amounts of data (speed is essential)? -0.57
What is the difference between the different padding types on iOS? 0.00
When should I use SHA-1 and when should I use SHA-2? +1.14
comparing md5 hashing in android(java) and c# +0.02
Message Digest Strength: Concatenation vs Iteration +0.13
Decrypting the Same Cipher Text With Different Keys (AES) -0.62
Is there a difference between ECDH and ECDSA keys? 0.00
Most Secure Encryption algorithm +0.36
CTR mode use of Initial Vector(IV) -0.30
In C, accessing my array index is faster or accessing by pointer is... -1.38
Is SHA1 still secure for use as hash function in PBKDF2? +0.35
Reverse a byte using assembly language +0.58
AES CBC encryption of streams in ruby? +1.64
Shuffling array in multiple threads +0.31
Storing metadata about password hashes in the database? +1.60
How to convert 38bit Byte Array to ASCII Decimal -0.13
efficient hash function for uris +1.35
Generate an initialization vector without a good source of randomness -0.49
How long can a hash left out in the open be considered safe? +0.38
HashAlgorithm implementation -0.62
When generating a SHA256 / 512 hash, is there a minimum 'safe' amou... +1.68
When compressing and encrypting, should I compress first, or encryp... -1.16
Slow AES decryption in Android 0.00
How to create or manipulate GPU assembler? +0.32
Instead of using common ciphers such as AES or blowfish twofish, ho... -0.76
What is a good embedded platform to use to teach yourself assembly... -1.22
would doing arithmetic operation on a pair of signed and unsigned n... +1.12
How to pick an appropriate IV (Initialization Vector) for AES/CTR/N... +0.58
Java HashSet using a specified method -0.80
How does the linux kernel manage less than 1GB physical memory? -2.70
What good source of entropy are available on a smart phone? 0.00
What version of the PKCS#1 spec is gcrypt implemented against? 0.00
Manual verification of XML Signature 0.00