• In computational complexity theory, a computational hardness assumption is the hypothesis that a particular problem cannot be solved efficiently (where...
    27 KB (3,303 words) - 17:58, 17 February 2025
  • The computational Diffie–Hellman (CDH) assumption is a computational hardness assumption about the Diffie–Hellman problem. The CDH assumption involves...
    6 KB (796 words) - 00:01, 8 March 2025
  • The decisional Diffie–Hellman (DDH) assumption is a computational hardness assumption about a certain problem involving discrete logarithms in cyclic...
    7 KB (1,120 words) - 21:48, 16 April 2025
  • Diffie–Hellman (XDH) assumption is a computational hardness assumption used in elliptic curve cryptography. The XDH assumption holds if there exist certain...
    5 KB (565 words) - 02:40, 18 June 2024
  • group element, given g, gx, and gy. Sometimes the DHP is called the computational Diffie–Hellman problem (CDHP) to more clearly distinguish it from the...
    8 KB (954 words) - 14:58, 28 May 2025
  • Small set expansion hypothesis (category Computational hardness assumptions)
    small set expansion conjecture in computational complexity theory is an unproven computational hardness assumption. Under the small set expansion hypothesis...
    13 KB (1,502 words) - 09:41, 8 January 2024
  • public-key cryptography, such as ElGamal, base their security on the hardness assumption that the discrete logarithm problem (DLP) over carefully chosen groups...
    17 KB (2,506 words) - 02:19, 27 April 2025
  • which a sport is played Hardtack Hardware (disambiguation) Computational hardness assumption This disambiguation page lists articles associated with the...
    2 KB (265 words) - 23:09, 29 May 2025
  • Exponential time hypothesis (category Computational hardness assumptions)
    In computational complexity theory, the exponential time hypothesis is an unproven computational hardness assumption that was formulated by Impagliazzo...
    22 KB (3,061 words) - 17:17, 18 August 2024
  • Security level (category Computational hardness assumptions)
    security level isn't set at design time, but represents a computational hardness assumption, which is adjusted to match the best currently known attack...
    13 KB (1,332 words) - 01:56, 12 March 2025
  • Integer factorization (category Computational hardness assumptions)
    (2002-09-13). "Computational Complexity Blog: Complexity Class of the Week: Factoring". Goldreich, Oded; Wigderson, Avi (2008), "IV.20 Computational Complexity"...
    25 KB (2,977 words) - 21:02, 19 June 2025
  • In cryptography, the strong RSA assumption states that the RSA problem is intractable even when the solver is allowed to choose the public exponent e (for...
    2 KB (228 words) - 09:25, 13 January 2024
  • Sub-group hiding (category Computational hardness assumptions)
    The sub-group hiding assumption is a computational hardness assumption used in elliptic curve cryptography and pairing-based cryptography. It was first...
    685 bytes (57 words) - 05:57, 17 October 2018
  • Unique games conjecture (category Computational hardness assumptions)
    known as a unique game, has NP-hard computational complexity. It has broad applications in the theory of hardness of approximation. If the unique games...
    28 KB (3,066 words) - 07:53, 29 May 2025
  • Lattice problem (category Computational hardness assumptions)
    basis for extremely secure cryptographic schemes. The use of worst-case hardness in such schemes makes them among the very few schemes that are very likely...
    28 KB (3,660 words) - 00:27, 24 May 2025
  • 1-vs-2 cycles problem (category Computational hardness assumptions)
    1-vs-2 cycles conjecture or 2-cycle conjecture is an unproven computational hardness assumption asserting that solving the 1-vs-2 cycles problem in the massively...
    4 KB (421 words) - 23:29, 12 January 2025
  • Short integer solution problem (category Computational hardness assumptions)
    tighter bound on the hardness assumption of SIS. This makes assuming the hardness of M-SIS a safer, but less efficient underlying assumption when compared to...
    16 KB (3,166 words) - 03:27, 7 April 2025
  • a construction of iO based on a computational hardness assumption relating to multilinear maps, but this assumption was later disproven. A construction...
    23 KB (2,298 words) - 12:53, 10 October 2024
  • currently computationally infeasible; this assumption is required for the security of the RSA cryptosystem. The Φ-hiding assumption is a stronger assumption, namely...
    3 KB (294 words) - 18:01, 17 February 2025
  • Linear (DLIN) assumption is a computational hardness assumption used in elliptic curve cryptography. In particular, the DLIN assumption is useful in settings...
    6 KB (980 words) - 19:59, 30 May 2024
  • Thumbnail for Cryptography
    science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in actual practice by...
    100 KB (11,007 words) - 01:11, 20 June 2025
  • format Decision composite residuosity in cryptography, see Computational hardness assumption Design change request, also document change request and database...
    2 KB (356 words) - 21:14, 17 February 2025
  • Thumbnail for Planted clique
    Planted clique (category Computational hardness assumptions)
    called the planted clique conjecture; it has been used as a computational hardness assumption. A clique in a graph is a subset of vertices, all of which...
    13 KB (1,688 words) - 15:08, 22 March 2025
  • Ring learning with errors (category Computational hardness assumptions)
    In post-quantum cryptography, ring learning with errors (RLWE) is a computational problem which serves as the foundation of new cryptographic algorithms...
    20 KB (2,962 words) - 19:28, 17 May 2025
  • RSA problem (category Computational hardness assumptions)
    OAEP, to protect against such structural problems in RSA. Strong RSA assumption RSA Factoring Challenge Rabin cryptosystem, whose equivalency to factoring...
    5 KB (681 words) - 13:17, 1 April 2025
  • Logjam (computer security) (category Computational hardness assumptions)
    effective method for finding discrete logarithms, consists of four large computational steps, of which the first three depend only on the order of the group...
    12 KB (1,297 words) - 06:30, 11 March 2025
  • Thumbnail for Time complexity
    conjecture has been used as a computational hardness assumption to prove the difficulty of several other problems in computational game theory, property testing...
    41 KB (4,997 words) - 15:01, 30 May 2025
  • decisional composite residuosity assumption (DCRA) is a mathematical assumption used in cryptography. In particular, the assumption is used in the proof of the...
    951 bytes (108 words) - 14:06, 19 April 2023
  • Thumbnail for Theoretical computer science
    game theory, machine learning, computational biology, computational economics, computational geometry, and computational number theory and algebra. Work...
    42 KB (4,803 words) - 23:57, 1 June 2025
  • Thumbnail for NP-hardness
    In computational complexity theory, a computational problem H is called NP-hard if, for every problem L which can be solved in non-deterministic polynomial-time...
    9 KB (1,119 words) - 00:35, 28 April 2025