Geometric cryptography is an area of cryptology where messages and ciphertexts are represented by geometric quantities such as angles or intervals and...
4 KB (476 words) - 22:33, 19 April 2023
Straightedge and compass construction (redirect from Geometric problems of antiquity)
physically impractical after about 20 binary digits. Carlyle circle Geometric cryptography Geometrography List of interactive geometry software, most of them...
36 KB (4,826 words) - 07:34, 9 June 2025
Strong cryptography or cryptographically strong are general terms used to designate the cryptographic algorithms that, when used correctly, provide a very...
22 KB (2,846 words) - 19:45, 6 February 2025
One-way function (category Cryptographic primitives)
compression function Cryptographic hash function Geometric cryptography Trapdoor function Oded Goldreich (2001). Foundations of Cryptography: Volume 1, Basic...
14 KB (1,956 words) - 16:22, 30 March 2025
Computational geometry (redirect from Geometric computation)
stated in terms of geometry. Some purely geometrical problems arise out of the study of computational geometric algorithms, and such problems are also considered...
15 KB (2,106 words) - 15:15, 19 May 2025
Grover's algorithm (category Post-quantum cryptography)
asymptotic speed-ups to many kinds of brute-force attacks on symmetric-key cryptography, including collision attacks and pre-image attacks. However, this may...
32 KB (4,691 words) - 00:04, 16 May 2025
Classical cipher (redirect from Classical cryptography)
In cryptography, a classical cipher is a type of cipher that was used historically but for the most part, has fallen into disuse. In contrast to modern...
15 KB (2,528 words) - 18:09, 11 December 2024
Institute, University of Oxford, professorial fellow in quantum physics and cryptography at Merton College, Oxford, Lee Kong Chian Centennial Professor at the...
15 KB (1,306 words) - 09:16, 16 May 2025
computer science, such as computer algorithms, programming languages, cryptography, automated theorem proving, and software development. Conversely, computer...
26 KB (2,771 words) - 14:34, 10 May 2025
Ideal lattice (redirect from Ideal Lattices and Cryptography)
also in other areas. In particular, they have a significant place in cryptography. Micciancio defined a generalization of cyclic lattices as ideal lattices...
39 KB (6,061 words) - 05:23, 17 June 2024
List of cryptographers (category Cryptography lists and comparisons)
This is a list of cryptographers. Cryptography is the practice and study of techniques for secure communication in the presence of third parties called...
22 KB (2,482 words) - 17:36, 10 May 2025
In mathematics, geometric calculus extends geometric algebra to include differentiation and integration. The formalism is powerful and can be shown to...
16 KB (3,338 words) - 21:48, 12 August 2024
Neural cryptography is a branch of cryptography dedicated to analyzing the application of stochastic algorithms, especially artificial neural network algorithms...
15 KB (2,224 words) - 13:07, 12 May 2025
Group theory (section Cryptography)
elliptic curve cryptography serve for public-key cryptography. Cryptographical methods of this kind benefit from the flexibility of the geometric objects, hence...
39 KB (5,086 words) - 11:47, 19 June 2025
Geometric analysis is a mathematical discipline where tools from differential equations, especially elliptic partial differential equations (PDEs), are...
4 KB (473 words) - 01:07, 7 December 2024
Coding theory (section Cryptographic coding)
fitness for specific applications. Codes are used for data compression, cryptography, error detection and correction, data transmission and data storage....
27 KB (3,712 words) - 08:44, 19 June 2025
a given object Normal basis (of a Galois extension), used heavily in cryptography Normal bundle Normal cone, of a subscheme in algebraic geometry Normal...
5 KB (580 words) - 21:03, 25 April 2025
cipher, Rosicrucian cipher, Napoleon cipher, and tic-tac-toe cipher) is a geometric simple substitution cipher, which exchanges letters for symbols which...
13 KB (1,674 words) - 01:25, 17 April 2025
(mathematics) Elliptic curve cryptography Envelope (mathematics) Fenchel's theorem Genus (mathematics) Geodesic Geometric genus Great-circle distance Harmonograph...
3 KB (262 words) - 20:23, 11 March 2022
Hash function (redirect from CryptographY/Hashfunctions)
terms of data integrity. Hash tables may use non-cryptographic hash functions, while cryptographic hash functions are used in cybersecurity to secure...
50 KB (7,455 words) - 21:00, 27 May 2025
Curve (redirect from Arc (geometric))
particular, algebraic curves over a finite field are widely used in modern cryptography. Interest in curves began long before they were the subject of mathematical...
26 KB (3,656 words) - 15:31, 1 April 2025
Theoretical computer science (section Cryptography)
computation, quantum computation, automata theory, information theory, cryptography, program semantics and verification, algorithmic game theory, machine...
42 KB (4,803 words) - 23:57, 1 June 2025
DNSCurve (category Elliptic curve cryptography)
Agency (NSA), elliptic curve cryptography offers vastly superior performance over RSA and Diffie–Hellman at a geometric rate as key sizes increase. DNSCurve...
11 KB (1,064 words) - 04:20, 14 May 2025
theory to study connectivity arising from small-scale interactions, cryptography because of conjectured computational hardness of several lattice problems...
17 KB (2,289 words) - 23:00, 6 May 2025
Chaotic cryptology (category Cryptography)
cryptology is the application of mathematical chaos theory to the practice of cryptography, the study or techniques used to privately and securely transmit information...
15 KB (1,794 words) - 02:09, 9 April 2025
Privacy-preserving computational geometry is the research area on the intersection of the domains of secure multi-party computation (SMC) and computational...
3 KB (326 words) - 00:44, 16 February 2022
Mining pool (section Geometric method)
the Wayback Machine" in the 18th International Conference on Financial Cryptography and Data Security(FC).2014 Eyal, Ittay. "The Miner's Dilemma" (PDF)....
13 KB (2,029 words) - 17:55, 8 June 2025
Mathematical proof (redirect from Geometric proof)
technically or colloquially in areas of pure mathematics, such as involving cryptography, chaotic series, and probabilistic number theory or analytic number theory...
34 KB (4,229 words) - 11:05, 26 May 2025
List of algorithms (redirect from List of geometric algorithms)
constant time Asymmetric (public key) encryption: ElGamal Elliptic curve cryptography MAE1 NTRUEncrypt RSA Digital signatures (asymmetric authentication):...
72 KB (7,951 words) - 17:13, 5 June 2025