StackRating

An Elo-based rating system for Stack Overflow
Home   |   About   |   Stats and Analysis   |   Get a Badge
Rating Stats for

Thomas Pornin

Rating
1621.47 (1,063rd)
Reputation
63,417 (1,412th)
Page: 1 ... 5 6 7 8 9 10 11
Title Δ
Distributions and hashes -0.69
When is it safe to use a broken hash function? +1.19
With RSA encryption, should I use the same certificate to sign and... +1.48
Objective-C : Fowler–Noll–Vo (FNV) Hash implementation +1.60
NoSuchAlgorithmException: Algorithm HmacSHA1 not available 0.00
How can I create a key using RSA/ECB/PKCS1Padding in python? 0.00
When log shows a lot of GC hits, what code change shall we need? -0.40
When encrypting data that is not an even multiple of the block size... +1.06
Is TLS / SSLv3 insecure? +1.35
ssh-2 rsa body format? 0.00
SSL encrpytion, SHA1 and SHA2 +1.59
Is eclipse's Garbage Collector different than the default? -1.64
C++ Why isn't call by reference needed for strcpy() +0.11
Which PHP mcrypt cipher is safest? +1.07
Endianness and C API's: Specifically OpenSSL -0.29
is this a correct way to generate rsa keys? +1.87
Characteristics of an Initialization Vector 0.00
JAR file: digital signature +0.39
Eclipse: Garbage Collector Button -1.95
Is SHA-1 secure for password storage? +1.41
Developers: How does BitLocker affect performance? +0.53
Using hash functions with Bloom filters +1.98
What is root reference? +0.22
Are fragments of hashes collision-resistent? +0.58
Can per-user randomized salts be replaced with iterative hashing? +0.34
Is calculating an MD5 hash less CPU intensive than SHA-1 or SHA-2? +0.39
What hash algorithms are parallelizable? Optimizing the hashing of... -0.99
Efficiency of the .NET garbage collector -0.43
Java RSA Encrypt - Decrypt .NET - need help 0.00
Can one construct a "good" hash function using CRC32C as... -1.15
Silverlight and Encryption, how to store/generate they key/iv pair? +0.45
Why does my Java RSA encryption give me an Arithmetic Exception? 0.00
Multiple signatures in S/MIME 0.00
Why aren't programs written in Assembly more often? -0.86
Should filters write to the response during or after filtering? +1.59
C# RSA Cryptographic Algorithm +2.16
who free's setvbuf buffer? -2.15
java -> System.gc(); Does this call opens a new Thread or not? -1.32
What garbage collection algorithms do all 5 major browsers use? -0.11
Interop: HmacSHA1 in Java and dotNet 0.00
How does heap compaction work quickly? 0.00
Is it possible to get RSA private key knowing public key and set of... +0.15
Do cryptographic hash functions reach each possible value, e.g. are... +0.74
Static property references non-static method -1.48
How can char* be a condition in for loop? +0.41
Decrypting “long” message encrypted with RSA java 0.00
For AES CBC encryption, whats the importance of the IV? +0.76
Why use SHA1 for hashing secrets when SHA-512 is more secure? +1.55
x86 assembly abs() implementation? -0.87
write system call to file desciptor ZERO 0.00