Search results

Jump to navigation Jump to search
Results 1 – 22 of 255
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)

Page title matches

Page text matches

  • [[Category:Asymmetric-key algorithms]] ...
    138 bytes (11 words) - 15:27, 13 April 2012
  • 2 KB (305 words) - 19:40, 1 February 2025
  • Asymmetric keys differ from symmetric keys in that the algorithms use separate keys for encryption and decryption, while a symmetric key’s al ...([[public-key cryptography|public]]) key pairs that are used by public key algorithms to generate digital signatures with possible long-term implications. When p ...
    10 KB (1,496 words) - 15:15, 16 June 2025
  • ...ve been shared among the two sides over some secure channel. However, some algorithms share the keys at the time of authentication. ...other (e.g., Internet shopping), this is not practical. There are various algorithms for both symmetric keys and asymmetric public key cryptography to solve thi ...
    4 KB (650 words) - 20:34, 18 October 2024
  • ...d five core research areas, termed "virtual laboratories": [[symmetric key algorithms]] (STVL), [[public key algorithm]]s (AZTEC), [[protocol (cryptography)|prot === Yearly report on algorithms and key lengths === ...
    5 KB (702 words) - 08:26, 3 April 2025
  • Shoup's main research interests and contributions are computer [[algorithms]] relating to [[number theory]], [[algebra]], and [[cryptography]]. His co ...GNU]] [[GNU General Public License|GPL]]) [[C++]] library of number theory algorithms, NTL, is widely used and well regarded for its high performance. ...
    4 KB (538 words) - 00:46, 18 March 2025
  • ...n February 2003 twelve of the submissions were selected. In addition, five algorithms already publicly known, but not explicitly submitted to the project, were c ==Selected algorithms== ...
    5 KB (657 words) - 12:41, 17 October 2024
  • ...key]] encryption algorithms; however various [[symmetric key encryption]] algorithms achieve a similar property (e.g., [[block ciphers]] when used in a chaining ...tor equal to the public key size. More efficient probabilistic encryption algorithms include [[ElGamal encryption|Elgamal]], [[Paillier]], and various construct ...
    4 KB (612 words) - 19:08, 11 February 2025
  • ...e output of that generator is used to encrypt the plaintext. Block cipher algorithms split the plaintext into fixed-size blocks and encrypt one block at a time. * [[Public-key cryptography|Public Key (Asymmetric) Algorithms]] ...
    10 KB (1,434 words) - 02:44, 27 June 2025
  • ...hy]] has separate keys for encrypting and decrypting.<ref>{{Cite web|title=Asymmetric-Key Cryptography|url=https://www.cs.cornell.edu/courses/cs5430/2013sp/TL04.asym ...sed by a brute force attack. Since perfect secrecy is not feasible for key algorithms, researches are now more focused on computational security. ...
    13 KB (1,823 words) - 15:21, 12 November 2025
  • [[Category:Routing algorithms]] ...
    1 KB (154 words) - 19:23, 30 May 2022
  • ...following is a brief and incomplete summary of public knowledge about NSA algorithms and protocols. |Protection of secret algorithms in [[firmware]] ...
    9 KB (1,112 words) - 02:34, 21 October 2023
  • ..."7-day" export review policies,{{Citation needed|date=November 2014}} when algorithms with larger key lengths could not legally be [[Export of cryptography from All 40-bit and 56-bit encryption algorithms are [[obsolete]], because they are vulnerable to brute force attacks, and t ...
    5 KB (798 words) - 21:50, 13 August 2024
  • ==Algorithms== ...
    5 KB (724 words) - 11:27, 4 September 2023
  • Cramer–Shoup consists of three algorithms: the key generator, the encryption algorithm, and the decryption algorithm. ...
    7 KB (1,041 words) - 17:33, 23 July 2024
  • [[Category:Asymmetric-key algorithms]] ...
    2 KB (304 words) - 12:11, 13 August 2023
  • ...ago. Cryptography uses a variety of different types of encryption. Earlier algorithms were performed by hand and are substantially different from modern [[algori ...ion; the receiver uses the shared key to perform decryption. Symmetric key algorithms can either be [[block cipher]]s or [[stream cipher]]s. Block ciphers operat ...
    9 KB (1,263 words) - 21:45, 22 March 2025
  • Goldwasser–Micali consists of three algorithms: a probabilistic key generation algorithm which produces a public and a pri ...
    7 KB (1,037 words) - 18:47, 24 August 2023
  • ...antonja |first3=Juan |last4=Zamora |first4=Antonio |date=2017-06-27 |title=Algorithms for Lightweight Key Exchange |journal=Sensors |language=en |volume=17 |issu Examples of popular symmetric-key algorithms include [[Twofish]], [[Serpent (cipher)|Serpent]], [[Advanced Encryption St ...
    15 KB (2,060 words) - 19:04, 21 September 2025
  • ==Basic algorithms== Consider the following basic algorithms written in Ada: ...
    11 KB (1,533 words) - 11:11, 14 December 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)