No results for "Category:Public-key encryption schemes" (auto) in titles.
Suggestions for article titles:
Integrated Encryption Scheme: Integrated Encryption Scheme (IES) is a hybrid encryption scheme which provides semantic security against an adversary who is able to use chosen-plaintext or chosen-ciphertext attacks. The security of the scheme is based on the computational Diffie–Hellman problem. [100%] 2023-02-21 [Cryptographic protocols]
GGH encryption scheme: The Goldreich–Goldwasser–Halevi (GGH) lattice-based cryptosystem is an asymmetric cryptosystem based on lattices. There is also a GGH signature scheme. [100%] 2023-10-18 [Lattice-based cryptography]
Integrated Encryption Scheme: Integrated Encryption Scheme (IES) is a hybrid encryption scheme which provides semantic security against an adversary who is able to use chosen-plaintext or chosen-ciphertext attacks. The security of the scheme is based on the computational Diffie–Hellman problem. [100%] 2024-03-06 [Cryptographic protocols]
Encryption: In cryptography, encryption is the process of transforming information (referred to as plaintext) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography ... [98%] 2023-02-04
Encryption: In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. (Process of converting plaintext to ciphertext) [98%] 2023-12-16 [Cryptography] [Data protection]...
Encryption: In cryptography, encryption is the process of transforming information (referred to as plaintext) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography ... [98%] 2023-02-04
Encryption: In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. (Process of converting plaintext to ciphertext) [98%] 2023-10-20 [Cryptography] [Data protection]...
Encryption: Encryption is the process of changing information into a secret code using an algorithm (cipher). It is usually carried out today by computers, although in the past it was traditionally carried out by analog machines or by specialists known as ... [98%] 2023-02-14 [Cryptography] [Computer Security]...
Encryption: The technique of encoding information is referred to as encryption when discussing cryptography. This procedure alters the information's initial representation, which is known as plaintext, into a different form that is known as ciphertext. [98%] 2023-11-02 [Cryptography] [Data protection]...
Scheme (programming language): Scheme is a dialect of the Lisp family of programming languages. Scheme was created during the 1970s at the MIT Computer Science and Artificial Intelligence Laboratory (MIT AI Lab) and released by its developers, Guy L. (Dialect of Lisp) [74%] 2023-11-27 [Scheme (programming language)] [Academic programming languages]...
Scheme: This is a placeholder for Portal:Engineering and Technology --> School:Computer Science --> Topic:Computer Programming --> Scheme This Programming Language resource is a "stub". Learn how you can help Wikiversity to develop it. [74%] 2023-12-18 [Programming languages]
Scheme (mathematics): Schemes, and functions between them, are the principal objects of study in modern algebraic geometry. Algebraic geometry began as the study of varieties, geometric figures described by polynomial equations with coefficents in a field. (Mathematics) [74%] 2023-06-17
Scheme (programming language): Scheme is functional programming language developed by Guy L. Steele. (Programming language) [74%] 2023-07-05
Scheme: A scheme is a ringed space that is locally isomorphic to an affine scheme. More precisely, a scheme consists of a topological space $X$ (the underlying space of the scheme) and a sheaf $\def\cO{ {\mathcal O}}\cO_X$ of commutative ... (Mathematics) [74%] 2023-11-04
Scheme (mathematics): In mathematics, a scheme is a mathematical structure that enlarges the notion of algebraic variety in several ways, such as taking account of multiplicities (the equations x = 0 and x = 0 define the same algebraic variety but different schemes) and ... (Mathematics) [74%] 2024-03-26 [Scheme theory]
Scheme (mathematics): In mathematics, a scheme is a mathematical structure that enlarges the notion of algebraic variety in several ways, such as taking account of multiplicities (the equations x = 0 and x = 0 define the same algebraic variety but different schemes) and ... (Mathematics) [74%] 2024-08-22 [Scheme theory]
Bulk encryption: Bulk encryption is the encipherment of all traffic on a digital transmission medium, without awareness of multiplexed channels, data link protocols, etc., in the medium. Especially on wireless media, it may be combined with techniques that secure the transmission channel ... [69%] 2023-10-25
Authenticated encryption: Authenticated Encryption (AE) is an encryption scheme which simultaneously assures the data confidentiality (also known as privacy: encrypted message is impossible to understand without the knowledge of a secret key) and authenticity (in other words, it is unforgeable: the encrypted ... (Forms) [69%] 2023-09-13 [Message authentication codes]
Disk encryption: Disk encryption is a technology which protects information by converting it into code that cannot be deciphered easily by unauthorized people or processes. Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on ... (Data security technology) [69%] 2023-10-23 [Disk encryption]