Search results
Jump to navigation
Jump to search
Page title matches
- {{Short description|Cryptography using tropical algebra}} ...ad rely on tropical algebras. The case for the use of tropical algebras in cryptography rests on at least two key features of tropical mathematics: in the tropical ...2 KB (230 words) - 01:41, 2 July 2024
- In [[cryptography]], a '''padded uniform random blob''' or '''PURB''' is a discipline for enc In addition, a PURB is [[Padding (cryptography)|padded]] to a constrained set of possible lengths, in order to minimize th ...11 KB (1,645 words) - 08:12, 4 January 2023
- In [[cryptography]], a '''round''' or '''round function''' is a basic transformation that is ...f>{{cite web |last1=Shannon |first1=Claude |title=A Mathematical Theory of Cryptography | url=https://www.iacr.org/museum/shannon/shannon45.pdf |date=September 1, ...8 KB (1,081 words) - 04:44, 30 November 2024
- ...ng parties. The security of YAK is disputed (see below and the [[Talk:YAK (cryptography)|talk page]]). ...p that is suitable for public key cryptography, including [[elliptic curve cryptography]]. Let <math>g^a</math> be Alice's long-term public key and <math>g^b</math ...6 KB (893 words) - 21:17, 10 February 2025
- In [[cryptography]], an '''accumulator''' is a [[one way function|one way]] membership [[hash * [[Cryptography]] ...18 KB (2,858 words) - 23:27, 26 January 2025
- In [[cryptography]], the '''hybrid argument''' is a proof technique used to show that two dis The hybrid argument is extensively used in cryptography. Some simple proofs using hybrid arguments are: ...4 KB (554 words) - 16:29, 9 July 2024
- {{Short description|Concept in cryptography}} ...urity of [[hash function]]s. It is of interest as a type of [[post-quantum cryptography]]. ...20 KB (2,880 words) - 23:48, 23 December 2024
- ...ctice, the term relativistic quantum cryptography is used for relativistic cryptography too. ...raphic tasks have been investigated in the setting of relativistic quantum cryptography.<ref name="ColbeckKentVBCT"/><ref name="Colbecksecurecomp"/><ref name="Colb ...25 KB (3,199 words) - 11:31, 12 December 2023
- ...as the [[RSA (cryptosystem)|RSA]], [[Diffie-Hellman]] or [[Elliptic-curve cryptography|elliptic-curve]] cryptosystems — which could, theoretically, be defeated us ...unced the Module-Lattice-Based Digital Signature Standard for post-quantum cryptography.<ref>{{Cite web |date=August 2024 |title=Module-Lattice-Based Digital Signa ...24 KB (3,173 words) - 01:44, 18 February 2025
- ...)|RSA cryptosystem]], [[Diffie–Hellman key exchange]] and [[elliptic curve cryptography]] are based on number theory and hence depend on commutative algebraic stru ...ange Using Semidirect Product of (Semi)Groups |chapter-url= |title=Applied Cryptography and Network Security. ACNS 2013 |publisher=Springer |series=Lecture Notes i ...12 KB (1,946 words) - 01:33, 29 June 2024
Page text matches
- {{Short description|Cryptography using tropical algebra}} ...ad rely on tropical algebras. The case for the use of tropical algebras in cryptography rests on at least two key features of tropical mathematics: in the tropical ...2 KB (230 words) - 01:41, 2 July 2024
- ...or decrypt message entirely.<ref name=GoldwasserBellare />{{rp|52}} Modern cryptography uses more robust notions of security. Recently, [[Ciphertext indistinguisha .../cseweb.ucsd.edu/~mihir/papers/gb.html|date=2012-04-21}}. Summer course on cryptography, MIT, 1996-2001</ref> An extremely low KR advantage is essential for an enc ...3 KB (431 words) - 17:51, 24 January 2025
- ..., say Eve, coerces honest parties Alice and Bob into establishing a [[Key (cryptography)|secret key]] where at least one of Alice and Bob does not know that the se | title = Public Key Cryptography ...1 KB (200 words) - 16:06, 27 June 2024
- In [[post-quantum cryptography]], '''NewHope''' is a [[key-agreement protocol]] by Erdem Alkim, Léo Ducas, ...experimenting-with-post-quantum.html|title=Experimenting with Post-Quantum Cryptography|date=7 July 2016|website=security.googleblog.com|accessdate=14 November 201 ...4 KB (523 words) - 19:18, 13 February 2025
- ...{{ISBN|1-58488-127-5}}</ref><ref name="schneier">Bruce Schneier, ''Applied Cryptography: Protocols, Algorithms, and Source Code in C'', pages 463-464, Wiley; 2nd e [[Category:Cryptography]] ...2 KB (248 words) - 14:44, 10 February 2025
- In [[computational complexity theory]] and [[cryptography]], '''averaging argument''' is a standard argument for proving theorems. It ...2-3}}</ref><ref name="goldreichbook2">[[Oded Goldreich]], ''Foundations of Cryptography, Volume 2: Basic Applications'', Cambridge University Press, 2004, {{ISBN|0 ...4 KB (641 words) - 00:21, 17 October 2022
- In [[cryptography]], the '''hybrid argument''' is a proof technique used to show that two dis The hybrid argument is extensively used in cryptography. Some simple proofs using hybrid arguments are: ...4 KB (554 words) - 16:29, 9 July 2024
- ...e=en}}</ref> and is widely used in cryptography. <ref>{{Cite journal|title=Cryptography from learning parity with noise |last1=Pietrzak |first1=Krzysztof|journal=I * Oded Regev, “On lattices, learning with errors, random linear codes, and cryptography,” in Proceedings of the thirty-seventh annual ACM symposium on Theory of co ...2 KB (359 words) - 10:37, 9 August 2024
- [[Tropical cryptography]] is cryptography based on the tropical semiring. ...2 KB (244 words) - 10:53, 13 January 2024
- ...te residuosity assumption (DCRA)''' is a mathematical assumption used in [[cryptography]]. In particular, the assumption is used in the proof of the [[Paillier cry ...951 bytes (123 words) - 15:06, 19 April 2023
- ...graphy]], the [[key size]] of an algorithm is the bit length of the [[Key (cryptography)|keys]] used by that algorithm, and it is an important factor of an algorit ...2 KB (306 words) - 12:56, 29 June 2024
- ...cite web | title=Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process | url=https://nvlpubs.nist.gov/nistpubs/ir/2021/NIS {{Cryptography navbox | hash}} ...5 KB (655 words) - 10:56, 27 November 2024
- In [[cryptography]] and the [[theory of computation]], '''Yao's test''' is a test defined by [[Category:Cryptography]] ...3 KB (416 words) - 21:47, 18 May 2023
- ...mber''' is a numerical value that characterizes the amount of [[Diffusion (cryptography)|diffusion]] introduced by a [[vectorial Boolean function]] {{mvar|F}} that ...Algebraic Representations |url=https://doc.sagemath.org/html/en/reference/cryptography/sage/crypto/sbox.html |website=sagemath.org |publisher=[[SageMath]] |access ...4 KB (646 words) - 04:34, 28 April 2024
- ...ng parties. The security of YAK is disputed (see below and the [[Talk:YAK (cryptography)|talk page]]). ...p that is suitable for public key cryptography, including [[elliptic curve cryptography]]. Let <math>g^a</math> be Alice's long-term public key and <math>g^b</math ...6 KB (893 words) - 21:17, 10 February 2025
- *[[Cryptography]] ...y 1943) is a Canadian mathematician. He deals with [[number theory]] and [[cryptography]]. ...7 KB (912 words) - 03:01, 24 August 2024
- ...air (''x'', ''y'') is then called a ''claw''. Some problems, especially in cryptography, are best solved when viewed as a claw finding problem, hence any algorithm As noted, most applications of the claw finding problem appear in [[cryptography]]. Examples include: ...4 KB (581 words) - 08:17, 25 May 2023
- ...|Lenstra]] heuristics, and [[elliptic curve]]s and their applications to [[cryptography]].{{cn|date=January 2023}} ...Elliptic_Curves.html?id=vPL19KNdm2wC ''Elliptic Curves: Number theory and cryptography''], CRC Press, 2003, 2nd edn. 2008 ...5 KB (589 words) - 07:48, 6 May 2024
- ...erger|first2=Christian|last3=Rijmen|first3=Vincent|title=Selected Areas in Cryptography |chapter=Breaking a New Hash Function Design Strategy Called SMASH |series= {{Cryptography navbox | hash}} ...2 KB (331 words) - 16:47, 22 August 2023
- A '''quantum money''' scheme is a [[Quantum Cryptography|quantum cryptographic]] protocol that creates and verifies banknotes that a ...he development of [[quantum key distribution]] protocols used in [[quantum cryptography]]. ...4 KB (560 words) - 00:49, 21 March 2024