Search results

From KYNNpedia
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...ewspaper]] or public [[blockchain]]. There are no (long-term) [[Public-key cryptography|private keys]] in use, avoiding [[Public key infrastructure|PKI]]-related r ...poral order and then assigned the same time value. Aggregation creates a [[Cryptography|cryptographic]] connection between all involved requests; the authenticatin ...
    13 KB (1,730 words) - 03:20, 21 August 2023
  • ** Methods for algorithms using asymmetric cryptography ...
    4 KB (539 words) - 09:07, 14 July 2023
  • ...cryption and decryption|an overview of cryptographic technology in general|Cryptography|the album by Pro-jekt|Encryption (album)}} ...ted back to original|thumb|300x300px|A simple illustration of [[public-key cryptography]], one of the most widely used forms of encryption]] ...
    34 KB (4,656 words) - 04:04, 20 February 2024
  • * [[Transient-key cryptography|Transient key]] scheme – variant of PKI with short-living signing keys. * [[Cryptography]] ...
    11 KB (1,571 words) - 20:46, 17 January 2024
  • ...nguishing sense from nonsense. It is also an important field of study in [[cryptography]] regarding separating a [[Signal (electronics)|signal]] from [[signal nois ==Cryptography== ...
    19 KB (2,809 words) - 12:52, 1 March 2024
  • *[[Cryptography]] *[[Cryptography]] ...
    16 KB (1,871 words) - 10:47, 24 February 2024
  • ...g]]. Quantum computing, [[quantum sensor|sensor]]s, [[quantum cryptography|cryptography]], [[quantum simulator|simulation]], [[quantum metrology|measurement]], [[q ...afe' in the advent of quantum computing systems that could break current [[cryptography]] systems using methods such as [[Shor's algorithm]]. These methods include ...
    35 KB (4,497 words) - 00:12, 28 January 2024
  • ...from “ Magnes sive de arte magnetica”.jpg|thumb|Illustration of a magnetic cryptography machine from “ Magnes sive de arte magnetica”]] ...
    19 KB (2,935 words) - 13:23, 26 August 2023
  • *[[Applied cryptography]] – applications of [[cryptography]]. ...
    30 KB (3,918 words) - 14:29, 8 January 2024
  • In [[cryptography|cryptographic]] terminology, [[cryptographic hash function]]s and cryptogra ...
    16 KB (2,478 words) - 03:32, 16 January 2024
  • *** [[Outline of cryptography|Cryptography]] – the technology to secure communications in the presence of third ...
    50 KB (5,938 words) - 10:47, 24 February 2024
  • {{Main|Device-independent quantum cryptography}} ...=Mayers|first= Dominic|author2= Yao, Andrew C.-C.|year=1998|title= Quantum Cryptography with Imperfect Apparatus| conference=IEEE Symposium on Foundations of Compu ...
    65 KB (9,506 words) - 04:24, 12 February 2024
  • ...06E2DA173CF93AA35753C1A961958260 "Europeans Reject U.S. Plan On Electronic Cryptography"]</ref> All three encryption initiatives thus failed to gain widespread acc ...
    59 KB (8,451 words) - 07:25, 11 January 2024
  • ...r networks carry to assist in identity confirmation. They can also store [[Cryptography|cryptographic]] keys and biometric [[data]]. The most popular type of secur ...
    31 KB (4,435 words) - 09:48, 21 June 2023
  • ...cal sequence of events that takes place when sender [[Placeholder names in cryptography|Alice]] transmits a message using a [[E-mail client|mail user agent]] (MUA) There are [[cryptography]] applications that can serve as a remedy to one or more of the above. For ...
    83 KB (11,561 words) - 15:41, 3 March 2024
  • ...assified version of Shannon's wartime work on the mathematical theory of [[cryptography]] ("[[Communication Theory of Secrecy Systems]]"), he proved that all theor ...
    38 KB (5,003 words) - 06:18, 8 January 2024
  • ...ing SCADA devices. In many cases, the control protocol lacks any form of [[Cryptography|cryptographic security]], allowing an attacker to control a SCADA device by ...
    38 KB (5,457 words) - 18:46, 3 March 2024
  • ...inatorics, discrete geometry, matrices, discrete probability, and parts of cryptography. * [[Coding theory]], including [[error correcting code]]s and a part of [[cryptography]] ...
    167 KB (22,187 words) - 21:43, 6 March 2024
  • ...Edition'' (Springer Science, New York) {{ISBN|978-0-387-95364-9}}.</ref> [[cryptography]], [[neurobiology]],<ref name="Spikes">{{cite book|title=Spikes: Exploring ...
    43 KB (5,955 words) - 18:56, 4 March 2024
  • ...f>{{harvnb|Stallings|2014|pp=41–42}}</ref> This can be achieved by using [[cryptography]], which changes the format of the transmitted information to make it unint ...|last2=Forcinito |first2=Mario A. |last3=McQuillan |first3=James M. |title=Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century ...
    190 KB (25,483 words) - 15:34, 3 March 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)