adaptive offline adversary. For randomized online algorithms competitiveness can depend upon the adversary model used. The three common adversaries are the oblivious...
3 KB (285 words) - 22:17, 14 December 2020
cryptosystem from achieving their goal Adversary model, in online algorithms, used to show competitiveness of randomized algorithms Adversarial alignment, when an...
1 KB (178 words) - 06:46, 6 June 2024
matrix representation adversary algorithm algorithm BSTW algorithm FGK algorithmic efficiency algorithmically solvable algorithm V all pairs shortest path...
35 KB (3,135 words) - 18:46, 6 May 2025
Message authentication code (redirect from Message Authentication Algorithm)
prevent forgery by adversaries without knowledge of the secret key, this is insufficient in certain scenarios. When an adversary is able to control the...
16 KB (1,918 words) - 17:55, 22 January 2025
oracle. Say that an adversary algorithm has access to an oracle that will apply a function to inputs that are sent to it. The algorithm sends the oracle...
2 KB (228 words) - 01:21, 22 October 2022
A randomized algorithm is an algorithm that employs a degree of randomness as part of its logic or procedure. The algorithm typically uses uniformly random...
33 KB (4,218 words) - 18:46, 19 February 2025
List update problem (category Analysis of algorithms)
Performance of algorithms depend on the construction of request sequences by adversaries under various adversary models An online algorithm for this problem...
8 KB (1,286 words) - 08:34, 15 March 2025
Some online algorithms: Insertion sort Perceptron Reservoir sampling Greedy algorithm Adversary model Metrical task systems Odds algorithm Page replacement...
6 KB (703 words) - 23:27, 8 February 2025
Encryption (redirect from Encryption algorithm)
encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is possible to decrypt the message without possessing the key but...
34 KB (3,645 words) - 07:39, 2 June 2025
In computer science, a selection algorithm is an algorithm for finding the k {\displaystyle k} th smallest value in a collection of ordered values, such...
45 KB (5,755 words) - 20:59, 28 January 2025
for on-line and randomized algorithms, which are typically data dependent. In competitive analysis, one imagines an "adversary" which deliberately chooses...
6 KB (794 words) - 12:55, 19 March 2024
recover a cipher's key. It is defined as the probability that the adversary algorithm can guess a cipher's randomly selected key, given a fixed amount...
3 KB (329 words) - 16:51, 24 January 2025
Oblivious RAM (category Analysis of algorithms)
transformed algorithm is independent of the memory access pattern of the original algorithm. The use of ORAMs is motivated by the fact that an adversary can obtain...
38 KB (3,993 words) - 05:17, 16 August 2024
Cryptographic hash function (redirect from Message-digest algorithm)
A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
49 KB (6,299 words) - 15:10, 30 May 2025
outperforms other algorithms which can guarantee O(n log n) behavior. Let us suppose an adversary wishes to force the Quicksort algorithm to make O(n2) comparisons...
8 KB (1,131 words) - 15:27, 20 November 2024
Theoretical computer science (section Algorithms)
parties (called adversaries). More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and that are related...
42 KB (4,803 words) - 23:57, 1 June 2025
of that type of algorithm. Note that in this context, the "adversary" is itself an algorithm and not a person. A cryptographic algorithm is considered secure...
6 KB (875 words) - 12:05, 9 April 2024
it to a receiver securely, in spite of eavesdropping and intercepting adversaries. Modern standards for public-key encryption of arbitrary messages are...
26 KB (3,061 words) - 21:04, 31 May 2025
MR 1471991, S2CID 13403194. Algorithms: Dasgupta, Papadimitriou, Vazirani Vazirani, Umesh Virkumar (1986-01-01). Randomness, Adversaries and Computation. University...
7 KB (547 words) - 02:53, 23 September 2024
determined by an algorithm defined in advance, and known by both Bob and Alice. The correct response might be as simple as "63x83z", with the algorithm changing...
11 KB (1,540 words) - 19:04, 12 December 2024
Quantum computing (redirect from Quantum search algorithms)
security. Quantum algorithms then emerged for solving oracle problems, such as Deutsch's algorithm in 1985, the Bernstein–Vazirani algorithm in 1993, and Simon's...
113 KB (12,431 words) - 10:15, 3 June 2025
Timing attack (section Algorithm)
compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms. Every logical operation in a computer takes time to execute, and the...
13 KB (1,616 words) - 12:26, 4 June 2025
Block cipher (redirect from Codebook algorithm)
In cryptography, a block cipher is a deterministic algorithm that operates on fixed-length groups of bits, called blocks. Block ciphers are the elementary...
51 KB (6,569 words) - 08:42, 11 April 2025
to be solvable by showing an algorithm that solves it; a computational problem is shown to be in P by showing an algorithm that solves it in time that...
9 KB (1,271 words) - 02:23, 5 May 2025
By treating opponents as a unified adversary whose payoff is the opposite of the focal player’s payoff, the algorithm can apply branch and bound techniques...
2 KB (272 words) - 19:35, 24 May 2025
cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in actual practice by any adversary. While...
99 KB (11,007 words) - 11:28, 7 June 2025
computer science, a distribution is pseudorandom against a class of adversaries if no adversary from the class can distinguish it from the uniform distribution...
7 KB (858 words) - 05:44, 9 January 2025
Alpha–beta pruning (category Graph algorithms)
Alpha–beta pruning is a search algorithm that seeks to decrease the number of nodes that are evaluated by the minimax algorithm in its search tree. It is an...
19 KB (2,405 words) - 22:15, 29 May 2025
K-server problem (category Online algorithms)
impossible for a k-server algorithm to perform well relative to its adversary. However, for the 2-server problem, there exists an algorithm that always has a...
10 KB (1,282 words) - 23:00, 2 June 2025
Quicksort (category Divide-and-conquer algorithms)
sorting algorithm. Quicksort was developed by British computer scientist Tony Hoare in 1959 and published in 1961. It is still a commonly used algorithm for...
71 KB (9,925 words) - 14:27, 31 May 2025