• adaptive offline adversary. For randomized online algorithms competitiveness can depend upon the adversary model used. The three common adversaries are the oblivious...
    3 KB (285 words) - 22:17, 14 December 2020
  • cryptosystem from achieving their goal Adversary model, in online algorithms, used to show competitiveness of randomized algorithms Adversarial alignment, when an...
    1 KB (178 words) - 06:46, 6 June 2024
  • matrix representation adversary algorithm algorithm BSTW algorithm FGK algorithmic efficiency algorithmically solvable algorithm V all pairs shortest path...
    35 KB (3,135 words) - 18:46, 6 May 2025
  • prevent forgery by adversaries without knowledge of the secret key, this is insufficient in certain scenarios. When an adversary is able to control the...
    16 KB (1,918 words) - 17:55, 22 January 2025
  • oracle. Say that an adversary algorithm has access to an oracle that will apply a function to inputs that are sent to it. The algorithm sends the oracle...
    2 KB (228 words) - 01:21, 22 October 2022
  • A randomized algorithm is an algorithm that employs a degree of randomness as part of its logic or procedure. The algorithm typically uses uniformly random...
    33 KB (4,218 words) - 18:46, 19 February 2025
  • List update problem (category Analysis of algorithms)
    Performance of algorithms depend on the construction of request sequences by adversaries under various adversary models An online algorithm for this problem...
    8 KB (1,286 words) - 08:34, 15 March 2025
  • Some online algorithms: Insertion sort Perceptron Reservoir sampling Greedy algorithm Adversary model Metrical task systems Odds algorithm Page replacement...
    6 KB (703 words) - 23:27, 8 February 2025
  • Thumbnail for Encryption
    encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is possible to decrypt the message without possessing the key but...
    34 KB (3,645 words) - 07:39, 2 June 2025
  • In computer science, a selection algorithm is an algorithm for finding the k {\displaystyle k} th smallest value in a collection of ordered values, such...
    45 KB (5,755 words) - 20:59, 28 January 2025
  • for on-line and randomized algorithms, which are typically data dependent. In competitive analysis, one imagines an "adversary" which deliberately chooses...
    6 KB (794 words) - 12:55, 19 March 2024
  • recover a cipher's key. It is defined as the probability that the adversary algorithm can guess a cipher's randomly selected key, given a fixed amount...
    3 KB (329 words) - 16:51, 24 January 2025
  • Oblivious RAM (category Analysis of algorithms)
    transformed algorithm is independent of the memory access pattern of the original algorithm. The use of ORAMs is motivated by the fact that an adversary can obtain...
    38 KB (3,993 words) - 05:17, 16 August 2024
  • Thumbnail for Cryptographic hash function
    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
    49 KB (6,299 words) - 15:10, 30 May 2025
  • outperforms other algorithms which can guarantee O(n log n) behavior. Let us suppose an adversary wishes to force the Quicksort algorithm to make O(n2) comparisons...
    8 KB (1,131 words) - 15:27, 20 November 2024
  • Thumbnail for Theoretical computer science
    parties (called adversaries). More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and that are related...
    42 KB (4,803 words) - 23:57, 1 June 2025
  • of that type of algorithm. Note that in this context, the "adversary" is itself an algorithm and not a person. A cryptographic algorithm is considered secure...
    6 KB (875 words) - 12:05, 9 April 2024
  • Thumbnail for Key encapsulation mechanism
    it to a receiver securely, in spite of eavesdropping and intercepting adversaries. Modern standards for public-key encryption of arbitrary messages are...
    26 KB (3,061 words) - 21:04, 31 May 2025
  • MR 1471991, S2CID 13403194. Algorithms: Dasgupta, Papadimitriou, Vazirani Vazirani, Umesh Virkumar (1986-01-01). Randomness, Adversaries and Computation. University...
    7 KB (547 words) - 02:53, 23 September 2024
  • determined by an algorithm defined in advance, and known by both Bob and Alice. The correct response might be as simple as "63x83z", with the algorithm changing...
    11 KB (1,540 words) - 19:04, 12 December 2024
  • Thumbnail for Quantum computing
    security. Quantum algorithms then emerged for solving oracle problems, such as Deutsch's algorithm in 1985, the Bernstein–Vazirani algorithm in 1993, and Simon's...
    113 KB (12,431 words) - 10:15, 3 June 2025
  • Thumbnail for Timing attack
    compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms. Every logical operation in a computer takes time to execute, and the...
    13 KB (1,616 words) - 12:26, 4 June 2025
  • In cryptography, a block cipher is a deterministic algorithm that operates on fixed-length groups of bits, called blocks. Block ciphers are the elementary...
    51 KB (6,569 words) - 08:42, 11 April 2025
  • to be solvable by showing an algorithm that solves it; a computational problem is shown to be in P by showing an algorithm that solves it in time that...
    9 KB (1,271 words) - 02:23, 5 May 2025
  • By treating opponents as a unified adversary whose payoff is the opposite of the focal player’s payoff, the algorithm can apply branch and bound techniques...
    2 KB (272 words) - 19:35, 24 May 2025
  • Thumbnail for Cryptography
    cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in actual practice by any adversary. While...
    99 KB (11,007 words) - 11:28, 7 June 2025
  • computer science, a distribution is pseudorandom against a class of adversaries if no adversary from the class can distinguish it from the uniform distribution...
    7 KB (858 words) - 05:44, 9 January 2025
  • Alpha–beta pruning (category Graph algorithms)
    Alpha–beta pruning is a search algorithm that seeks to decrease the number of nodes that are evaluated by the minimax algorithm in its search tree. It is an...
    19 KB (2,405 words) - 22:15, 29 May 2025
  • K-server problem (category Online algorithms)
    impossible for a k-server algorithm to perform well relative to its adversary. However, for the 2-server problem, there exists an algorithm that always has a...
    10 KB (1,282 words) - 23:00, 2 June 2025
  • Thumbnail for Quicksort
    Quicksort (category Divide-and-conquer algorithms)
    sorting algorithm. Quicksort was developed by British computer scientist Tony Hoare in 1959 and published in 1961. It is still a commonly used algorithm for...
    71 KB (9,925 words) - 14:27, 31 May 2025