Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Thumbnail for Cryptography
    Cryptography, or cryptology (from Ancient Greek: κρυπτός, romanized: kryptós "hidden, secret"; and γράφειν graphein, "to write", or -λογία -logia, "study"...
    98 KB (10,730 words) - 08:25, 22 April 2024
  • Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms...
    53 KB (5,552 words) - 22:03, 30 March 2024
  • Thumbnail for Public-key cryptography
    Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a...
    35 KB (4,031 words) - 00:41, 26 April 2024
  • Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC...
    39 KB (4,660 words) - 19:30, 4 March 2024
  • In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend...
    13 KB (1,481 words) - 10:58, 19 December 2023
  • Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography...
    80 KB (8,934 words) - 16:44, 23 April 2024
  • Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might...
    50 KB (6,651 words) - 19:44, 20 March 2024
  • Lattice-based cryptography is the generic term for constructions of cryptographic primitives that involve lattices, either in the construction itself...
    23 KB (2,749 words) - 22:35, 20 February 2024
  • A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic...
    12 KB (1,496 words) - 14:16, 25 March 2024
  • Thumbnail for Cryptographic hash function
    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
    45 KB (6,067 words) - 00:54, 2 April 2024
  • The export of cryptography is the transfer from one country to another of devices and technology related to cryptography. In the early days of the Cold...
    2 KB (166 words) - 23:42, 21 January 2024
  • Elliptic Curve Digital Signature Algorithm (category Public-key cryptography)
    In cryptography, the Elliptic Curve Digital Signature Algorithm (ECDSA) offers a variant of the Digital Signature Algorithm (DSA) which uses elliptic-curve...
    19 KB (2,831 words) - 04:30, 20 January 2024
  • In cryptography, padding is any of a number of distinct practices which all include adding data to the beginning, middle, or end of a message prior to...
    23 KB (3,307 words) - 18:11, 14 February 2024
  • suitable for use in cryptography. It is also loosely known as a cryptographic random number generator (CRNG). Most cryptographic applications require...
    30 KB (3,741 words) - 05:34, 27 March 2024
  • Thumbnail for Encryption
    In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext...
    33 KB (3,575 words) - 16:30, 24 April 2024
  • BLS digital signature, also known as Boneh–Lynn–Shacham (BLS), is a cryptographic signature scheme which allows a user to verify that a signer is authentic...
    8 KB (1,009 words) - 11:28, 12 March 2024
  • Thumbnail for Alice and Bob
    fictional characters commonly used as placeholders in discussions about cryptographic systems and protocols, and in other science and engineering literature...
    24 KB (2,023 words) - 07:18, 22 April 2024
  • Post-Quantum Cryptography Standardization is a program and competition by NIST to update their standards to include post-quantum cryptography. It was announced...
    35 KB (2,511 words) - 18:57, 4 April 2024
  • Financial cryptography is the use of cryptography in applications in which financial loss could result from subversion of the message system. Financial...
    5 KB (546 words) - 10:05, 22 March 2024
  • Thumbnail for Blu-ray
    and Blu-ray Archived November 1, 2007, at the Wayback Machine from cryptography.com US application 2010169663, "Systems and Methods for Detecting Authorized...
    170 KB (15,584 words) - 16:10, 25 April 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)