In theoretical computer science and cryptography, a trapdoor function is a function that is easy to compute in one direction, yet difficult to compute...
9 KB (1,316 words) - 00:34, 25 June 2024
mills, however, its list of uses has grown over time. The trapdoor has played a pivotal function in the operation of the gallows, cargo ships, trains, booby...
6 KB (592 words) - 18:25, 18 February 2025
based on a trapdoor function whose security, like that of RSA, is related to the difficulty of integer factorization. The Rabin trapdoor function has the...
14 KB (2,077 words) - 14:01, 26 March 2025
existence of one-way functions. A trapdoor one-way function or trapdoor permutation is a special kind of one-way function. Such a function is hard to invert...
14 KB (1,956 words) - 16:22, 30 March 2025
plaintext prior to asymmetric encryption. When combined with any secure trapdoor one-way permutation f {\displaystyle f} , this processing is proved in...
9 KB (1,460 words) - 06:54, 21 May 2025
variant of the learning with errors lattice problem as its basic trapdoor function. It won the NIST competition for the first post-quantum cryptography...
15 KB (1,472 words) - 11:17, 9 June 2025
Key management Key size Public-key cryptography Rabin cryptosystem Trapdoor function Namely, the values of m which are equal to −1, 0, or 1 modulo p while...
60 KB (7,783 words) - 17:58, 20 June 2025
Cryptography (section Cryptographic hash functions)
cryptographic hash function is computed, and only the resulting hash is digitally signed. Cryptographic hash functions are functions that take a variable-length...
100 KB (11,007 words) - 01:11, 20 June 2025
schemes. The first such scheme which is not built on trapdoor functions but rather on a family of function with a much weaker required property of one-way...
45 KB (5,315 words) - 16:52, 11 April 2025
m {\displaystyle m} of G {\displaystyle G} using a reversible mapping function. Choose an integer y {\displaystyle y} randomly from { 1 , … , q − 1 }...
10 KB (1,473 words) - 11:12, 31 March 2025
In cryptography, a sponge function or sponge construction is any of a class of algorithms with finite internal state that take an input bit stream of any...
7 KB (846 words) - 09:04, 19 April 2025
a single key pair for one user. Choose an approved cryptographic hash function H {\displaystyle H} with output length | H | {\displaystyle |H|} bits....
16 KB (2,221 words) - 09:42, 28 May 2025
{\displaystyle e={\textrm {HASH}}(m)} . (Here HASH is a cryptographic hash function, such as SHA-2, with the output converted to an integer.) Let z {\displaystyle...
19 KB (2,833 words) - 08:53, 8 May 2025
secret Trapdoor function Trusted timestamping Key-based routing Onion routing Garlic routing Kademlia Mix network Mathematics Cryptographic hash function Block...
7 KB (920 words) - 14:16, 11 May 2025
Feistel cipher (redirect from F-function)
similar operations, and both consist of iteratively running a function called a "round function" a fixed number of times. Many modern symmetric block ciphers...
10 KB (1,316 words) - 19:41, 2 February 2025
PBKDF2 (category Key derivation functions)
cryptography, PBKDF1 and PBKDF2 (Password-Based Key Derivation Function 1 and 2) are key derivation functions with a sliding computational cost, used to reduce vulnerability...
13 KB (1,337 words) - 12:18, 2 June 2025
secret Trapdoor function Trusted timestamping Key-based routing Onion routing Garlic routing Kademlia Mix network Mathematics Cryptographic hash function Block...
7 KB (806 words) - 17:40, 18 June 2025
In cryptography, a key derivation function (KDF) is a cryptographic algorithm that derives one or more secret keys from a secret value such as a master...
13 KB (1,640 words) - 18:48, 30 April 2025
secret Trapdoor function Trusted timestamping Key-based routing Onion routing Garlic routing Kademlia Mix network Mathematics Cryptographic hash function Block...
4 KB (391 words) - 16:20, 12 April 2025
In cryptography, a pseudorandom function family, abbreviated PRF, is a collection of efficiently-computable functions which emulate a random oracle in...
8 KB (1,021 words) - 19:10, 12 June 2025
Merkle tree (category Cryptographic hash functions)
Merkle trees by Satoshi Nakamoto applies the compression step of the hash function to an excessive degree, which is mitigated by using Fast Merkle Trees....
15 KB (1,822 words) - 16:33, 18 June 2025
key from x k {\displaystyle x_{k}} using some hash-based key derivation function. The shared secret calculated by both parties is equal, because d A ⋅ Q...
14 KB (2,168 words) - 17:05, 25 May 2025
there are 26 letters in the Latin alphabet and 26 = 2 × 13, the ROT13 function is its own inverse: ROT 13 ( ROT 13 ( x ) ) = x {\displaystyle...
19 KB (2,089 words) - 00:10, 20 May 2025
one-way trapdoor function and a random function (hash function); EPOC-2 uses a one-way trapdoor function, two random functions (hash functions) and a symmetric-key...
3 KB (323 words) - 22:25, 27 February 2024
secret Trapdoor function Trusted timestamping Key-based routing Onion routing Garlic routing Kademlia Mix network Mathematics Cryptographic hash function Block...
13 KB (1,509 words) - 15:01, 13 June 2025
g, ga mod p, and gb mod p. Such a function that is easy to compute but hard to invert is called a one-way function. Once Alice and Bob compute the shared...
47 KB (5,367 words) - 01:46, 20 June 2025
type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key. As with any MAC, it may be used to simultaneously...
18 KB (2,316 words) - 18:51, 16 April 2025
{\displaystyle \mu =(L(g^{\lambda }{\bmod {n}}^{2}))^{-1}{\bmod {n}}} , where function L {\displaystyle L} is defined as L ( x ) = x − 1 n {\displaystyle L(x)={\frac...
13 KB (1,929 words) - 21:01, 7 December 2023
secret Trapdoor function Trusted timestamping Key-based routing Onion routing Garlic routing Kademlia Mix network Mathematics Cryptographic hash function Block...
823 bytes (82 words) - 14:45, 4 December 2017
The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989. The algorithm is optimized for 8-bit computers. MD2...
9 KB (1,053 words) - 04:19, 31 December 2024