NOTICE: Citizendium is still being set up on its newer server, treat as a beta for now; please see here for more.
Citizendium - a community developing a quality comprehensive compendium of knowledge, online and free. Click here to join and contribute—free
CZ thanks our previous donors. Donate here. Treasurer's Financial Report -- Thanks to our content contributors. --

Search results

Jump to: navigation, search

Page title matches

  • ...encryption, but the average person would not be able to obtain the public key for a high-security network such as [[JWICS]]. | title = Multi-user cryptographic techniques
    8 KB (1,230 words) - 06:09, 24 May 2012
  • ...d to encrypt and be freely available, and only the holder of the "private" key can decrypt the message
    315 B (47 words) - 00:24, 10 August 2008
  • {{r|Symmetric key cryptography}} {{r|Public key infrastructure}}
    398 B (43 words) - 01:00, 30 July 2010

Page text matches

  • #REDIRECT [[Asymmetric key cryptography]]
    41 B (4 words) - 19:11, 3 October 2008
  • #REDIRECT [[Asymmetric key cryptography]]
    41 B (4 words) - 19:10, 3 October 2008
  • #REDIRECT [[Asymmetric key cryptography]]
    41 B (4 words) - 18:34, 3 October 2008
  • {{r|Asymmetric key cryptography}} {{r|Cryptographic key}}
    707 B (89 words) - 01:09, 30 July 2010
  • {{r|Asymmetric key cryptography}} {{r|Cryptographic key}}
    608 B (77 words) - 20:58, 11 January 2010
  • ...Secret key" is slightly misleading, as the [[private key]] in [[asymmetric key cryptography]] also must be protected. ...indeed, did every known system until the advent of asymmetric key (public key) methods in the mid-1970s. The next level of complexity moved to polyalpha
    4 KB (543 words) - 10:29, 31 May 2009
  • {{r|Symmetric key cryptography}} {{r|Asymmetric key cryptography}}
    1 KB (176 words) - 04:27, 18 May 2012
  • {{r|Asymmetric key cryptography}} {{r|Cryptographic key}}
    657 B (85 words) - 22:19, 11 January 2010
  • ...thm]]. A [[cipher]] uses an encryption key for encryption and a decryption key for decryption, a [[digital signature]] uses a signature keys for signing and verification key for verifying the signature.
    3 KB (520 words) - 07:50, 20 March 2010
  • {{r|Symmetric key cryptography}} {{r|Asymmetric key cryptography}}
    2 KB (293 words) - 23:42, 2 April 2018
  • ...encryption, but the average person would not be able to obtain the public key for a high-security network such as [[JWICS]]. | title = Multi-user cryptographic techniques
    8 KB (1,230 words) - 06:09, 24 May 2012
  • {{r|asymmetric key cryptography}} -->
    259 B (33 words) - 23:53, 29 July 2010
  • ...[[information security#source authentication|source authentication]] and [[key management]] services while the faster symmetric techniques do the high-vol ...eneral protection mechanism, and [[DNS security]]. All require a source of cryptographic quality [[random number]]s.
    3 KB (541 words) - 08:17, 18 May 2012
  • Auto-populated based on [[Special:WhatLinksHere/Public key infrastructure]]. Needs checking by a human. {{r|Asymmetric key cryptography}}
    594 B (73 words) - 00:48, 12 January 2010
  • ...ently random symbols; if the system performs as designed, then without the key an eavesdropper cannot read messages. ...ryptographic_hash_algorithms | hashes]] and [[#Public key systems | public key systems]] below for techniques used to provide them.
    56 KB (8,878 words) - 17:44, 10 April 2014
  • ...ho intercepts the message sees only apparently random symbols; without the key he cannot read it. ...ryptographic_hash_algorithms | hashes]] and [[#Public key systems | public key systems]] below for techniques used to provide them.
    55 KB (8,724 words) - 22:37, 25 August 2013
  • ...er main type are [[stream cipher]]s, which generate a continuous stream of keying material to be mixed with messages. ...he wants to read the material without authorisation, and often without the key. See [[cryptanalysis]] for his methods.
    53 KB (8,368 words) - 20:41, 29 June 2014
  • ...er main type are [[stream cipher]]s, which generate a continuous stream of keying material to be mixed with messages. ...he wants to read the material without authorisation, and often without the key. See[[cryptanalysis]] for his methods.
    53 KB (8,395 words) - 18:27, 22 August 2013
  • {{r|Asymmetrical cryptosystem}} {{r|Key management (cryptography)}}
    865 B (99 words) - 07:42, 26 October 2008
  • {{rpl|Asymmetric key cryptography|public key}}
    3 KB (355 words) - 03:06, 4 March 2010

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)