Search results

Jump to navigation Jump to search
  • ...on]] can be done in such a way that it uses this test. This is useful in [[cryptography]]. ...
    2 KB (270 words) - 22:05, 9 June 2016
  • The '''Meet-in-the-middle attack''' is a [[cryptography|cryptographic]] attack which, like the [[birthday attack]], makes use of a ...block cipher, one might get the idea to simply use two independent [[Key (cryptography))|key]]s to encrypt the data twice and think that this would square the sec ...
    3 KB (474 words) - 09:45, 20 October 2014
  • ...or [[algorithm]]) to find out if a certain number is a [[prime number]]. [[Cryptography]] uses prime numbers, and needs to test if a certain number is prime. The ...
    684 bytes (103 words) - 14:10, 24 July 2017
  • In [[cryptography]], a '''Feistel cipher''' is a symmetric structure used in the construction ...el block cipher construction, and proved that if the round function is a [[Cryptography|cryptographically]] secure [[pseudorandom function]], with K<sub>i</sub> us ...
    5 KB (757 words) - 08:22, 4 April 2017
  • ...n-the-middle attack]] attack uses a space-time tradeoff to find the [[Key (cryptography)|cryptographic key]] in only <math>2^{n+1}</math> encryptions (and <math>O( ...
    3 KB (482 words) - 01:39, 25 October 2013
  • ...hy)|keys]]. This is also called ''[[:en:Public-key_cryptography|public key cryptography]]'', because one of them can be given to everyone. The other key must be ke RSA involves a public [[Key (cryptography)|key]] and private key. The public key can be known to everyone; it is used ...
    14 KB (2,168 words) - 11:19, 5 August 2017
  • Modular arithmetic is useful in many fields, such as [[cryptography]], [[computer science]], and [[music]]. It is often used in calculating [[c ...
    2 KB (332 words) - 07:26, 9 March 2015
  • ...nges over time. This kind of [[signal processing]] has many uses such as [[cryptography]], [[oceanography]], [[speech recognition]], or [[handwriting]] recognition ...
    3 KB (471 words) - 16:51, 26 March 2017
  • ...ki/PCP_theorem PCP theorem]. In [http://en.wikipedia.org/wiki/Cryptography cryptography] too, expander graphs are used to construct hash functions." ...
    8 KB (1,407 words) - 02:23, 25 July 2011
  • ...ki/PCP_theorem PCP theorem]. In [http://en.wikipedia.org/wiki/Cryptography cryptography] too, expander graphs are used to construct hash functions." ...
    15 KB (2,745 words) - 10:19, 4 January 2011
  • ...on boolean function analysis, computational complexity and foundations of cryptography. ...
    12 KB (1,731 words) - 06:09, 29 April 2019
  • ...s include quantum algorithms, quantum complexity theory and (post-)quantum cryptography. ...
    14 KB (1,850 words) - 01:51, 7 May 2018
  • ...ki/PCP_theorem PCP theorem]. In [http://en.wikipedia.org/wiki/Cryptography cryptography] too, expander graphs are used to construct hash functions." ...
    34 KB (6,244 words) - 15:28, 8 June 2013
  • ...ki/PCP_theorem PCP theorem]. In [http://en.wikipedia.org/wiki/Cryptography cryptography] too, expander graphs are used to construct hash functions." ...
    35 KB (6,195 words) - 08:39, 7 June 2010
  • ...ki/PCP_theorem PCP theorem]. In [http://en.wikipedia.org/wiki/Cryptography cryptography] too, expander graphs are used to construct hash functions." ...
    37 KB (6,824 words) - 02:20, 29 December 2015
  • ...ki/PCP_theorem PCP theorem]. In [http://en.wikipedia.org/wiki/Cryptography cryptography] too, expander graphs are used to construct hash functions." ...
    41 KB (7,547 words) - 09:24, 22 May 2023