• Geometric cryptography is an area of cryptology where messages and ciphertexts are represented by geometric quantities such as angles or intervals and...
    4 KB (476 words) - 22:33, 19 April 2023
  • Geometry (redirect from Geometric)
    applications in many areas, including cryptography and string theory. Complex geometry studies the nature of geometric structures modelled on, or arising...
    102 KB (10,101 words) - 21:35, 19 June 2025
  • Thumbnail for Straightedge and compass construction
    physically impractical after about 20 binary digits. Carlyle circle Geometric cryptography Geometrography List of interactive geometry software, most of them...
    36 KB (4,826 words) - 07:34, 9 June 2025
  • Strong cryptography or cryptographically strong are general terms used to designate the cryptographic algorithms that, when used correctly, provide a very...
    22 KB (2,846 words) - 19:45, 6 February 2025
  • One-way function (category Cryptographic primitives)
    compression function Cryptographic hash function Geometric cryptography Trapdoor function Oded Goldreich (2001). Foundations of Cryptography: Volume 1, Basic...
    14 KB (1,956 words) - 16:22, 30 March 2025
  • stated in terms of geometry. Some purely geometrical problems arise out of the study of computational geometric algorithms, and such problems are also considered...
    15 KB (2,106 words) - 15:15, 19 May 2025
  • Grover's algorithm (category Post-quantum cryptography)
    asymptotic speed-ups to many kinds of brute-force attacks on symmetric-key cryptography, including collision attacks and pre-image attacks. However, this may...
    32 KB (4,691 words) - 00:04, 16 May 2025
  • In cryptography, a classical cipher is a type of cipher that was used historically but for the most part, has fallen into disuse. In contrast to modern...
    15 KB (2,528 words) - 18:09, 11 December 2024
  • Thumbnail for Artur Ekert
    Institute, University of Oxford, professorial fellow in quantum physics and cryptography at Merton College, Oxford, Lee Kong Chian Centennial Professor at the...
    15 KB (1,306 words) - 09:16, 16 May 2025
  • Thumbnail for Discrete mathematics
    computer science, such as computer algorithms, programming languages, cryptography, automated theorem proving, and software development. Conversely, computer...
    26 KB (2,771 words) - 14:34, 10 May 2025
  • also in other areas. In particular, they have a significant place in cryptography. Micciancio defined a generalization of cyclic lattices as ideal lattices...
    39 KB (6,061 words) - 05:23, 17 June 2024
  • List of cryptographers (category Cryptography lists and comparisons)
    This is a list of cryptographers. Cryptography is the practice and study of techniques for secure communication in the presence of third parties called...
    22 KB (2,482 words) - 17:36, 10 May 2025
  • In mathematics, geometric calculus extends geometric algebra to include differentiation and integration. The formalism is powerful and can be shown to...
    16 KB (3,338 words) - 21:48, 12 August 2024
  • Neural cryptography is a branch of cryptography dedicated to analyzing the application of stochastic algorithms, especially artificial neural network algorithms...
    15 KB (2,224 words) - 13:07, 12 May 2025
  • Thumbnail for Group theory
    elliptic curve cryptography serve for public-key cryptography. Cryptographical methods of this kind benefit from the flexibility of the geometric objects, hence...
    39 KB (5,086 words) - 11:47, 19 June 2025
  • Thumbnail for Geometric analysis
    Geometric analysis is a mathematical discipline where tools from differential equations, especially elliptic partial differential equations (PDEs), are...
    4 KB (473 words) - 01:07, 7 December 2024
  • Thumbnail for Coding theory
    fitness for specific applications. Codes are used for data compression, cryptography, error detection and correction, data transmission and data storage....
    27 KB (3,712 words) - 08:44, 19 June 2025
  • a given object Normal basis (of a Galois extension), used heavily in cryptography Normal bundle Normal cone, of a subscheme in algebraic geometry Normal...
    5 KB (580 words) - 21:03, 25 April 2025
  • Thumbnail for Pigpen cipher
    cipher, Rosicrucian cipher, Napoleon cipher, and tic-tac-toe cipher) is a geometric simple substitution cipher, which exchanges letters for symbols which...
    13 KB (1,674 words) - 01:25, 17 April 2025
  • (mathematics) Elliptic curve cryptography Envelope (mathematics) Fenchel's theorem Genus (mathematics) Geodesic Geometric genus Great-circle distance Harmonograph...
    3 KB (262 words) - 20:23, 11 March 2022
  • Thumbnail for Hash function
    terms of data integrity. Hash tables may use non-cryptographic hash functions, while cryptographic hash functions are used in cybersecurity to secure...
    50 KB (7,455 words) - 21:00, 27 May 2025
  • Thumbnail for Curve
    Curve (redirect from Arc (geometric))
    particular, algebraic curves over a finite field are widely used in modern cryptography. Interest in curves began long before they were the subject of mathematical...
    26 KB (3,656 words) - 15:31, 1 April 2025
  • Thumbnail for Theoretical computer science
    computation, quantum computation, automata theory, information theory, cryptography, program semantics and verification, algorithmic game theory, machine...
    42 KB (4,803 words) - 23:57, 1 June 2025
  • DNSCurve (category Elliptic curve cryptography)
    Agency (NSA), elliptic curve cryptography offers vastly superior performance over RSA and Diffie–Hellman at a geometric rate as key sizes increase. DNSCurve...
    11 KB (1,064 words) - 04:20, 14 May 2025
  • Thumbnail for Lattice (group)
    theory to study connectivity arising from small-scale interactions, cryptography because of conjectured computational hardness of several lattice problems...
    17 KB (2,289 words) - 23:00, 6 May 2025
  • Chaotic cryptology (category Cryptography)
    cryptology is the application of mathematical chaos theory to the practice of cryptography, the study or techniques used to privately and securely transmit information...
    15 KB (1,794 words) - 02:09, 9 April 2025
  • Privacy-preserving computational geometry is the research area on the intersection of the domains of secure multi-party computation (SMC) and computational...
    3 KB (326 words) - 00:44, 16 February 2022
  • the Wayback Machine" in the 18th International Conference on Financial Cryptography and Data Security(FC).2014 Eyal, Ittay. "The Miner's Dilemma" (PDF)....
    13 KB (2,029 words) - 17:55, 8 June 2025
  • Thumbnail for Mathematical proof
    technically or colloquially in areas of pure mathematics, such as involving cryptography, chaotic series, and probabilistic number theory or analytic number theory...
    34 KB (4,229 words) - 11:05, 26 May 2025
  • constant time Asymmetric (public key) encryption: ElGamal Elliptic curve cryptography MAE1 NTRUEncrypt RSA Digital signatures (asymmetric authentication):...
    72 KB (7,951 words) - 17:13, 5 June 2025