Information about Test

  1. Cryptography

    Cryptography or cryptology (from Ancient Greek: κρυπτός, romanized: kryptós "hidden, secret"; and γράφειν graphein, "to write", or -λογία -logia, "study"

  2. Public-key cryptography

    Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and

  3. Elliptic-curve cryptography

    Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC

  4. Symmetric-key algorithm

    Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext

  5. Encryption

    In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who

  6. Post-quantum cryptography

    Post-quantum cryptography (sometimes referred to as quantum-proof, quantum-safe or quantum-resistant) refers to cryptographic algorithms (usually public-key

  7. Salt (cryptography)

    In cryptography, a salt is random data that is used as an additional input to a one-way function that hashes data, a password or passphrase. Salts are

  8. History of cryptography

    Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might

  9. Quantum cryptography

    Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography

  10. RSA (cryptosystem)

    "Introduction to Cryptography with Open-Source Software". p. 12. Surender R. Chiluka. "Public key Cryptography". Neal Koblitz. "Cryptography As a Teaching