Post-quantum Cryptography

uplinks:: Cryptography tags:: #type/term #lang/en Post-quantum Cryptography Post-quantum Cryptography refers to cryptographic algorithms that are thought to be secured against a cryptanalytic attack by a quantum computer References See Also

2022-02-23
Post-quantum Cryptography

Prime Number

uplinks:: Number Theory tags:: #lang/en #type/term Prime Number A Natural Number greater than 1 that is not a product of two smaller natural numbers. References See Also

2022-02-23
Prime Number

Probability of someone generating the same private key

uplinks:: Probability Public-key Cryptography tags:: #lang/en #type/faq Probability of someone generating the same private key Assuming that the private Key Space is bits long, a total of private keys can be generated. Therefore, the probabiity of someone generating the exact private key equals t…

2022-02-23
Probability of someone generating the same private key

Probability

uplinks:: Applied Mathematics tags:: #lang/en #type/term Probability A branch of mathematics concerned with finding out the likelihood of the occurence of an event. Examples Coin Flip Probability Dice Roll Probability Probability of someone generating the same private key References See Also

2022-02-23
Probability

Pseudonymous

uplinks:: Privacy tags:: #lang/en #note/empty #type/term Pseudonymous References See Also Anonymous

2022-02-23
Pseudonymous

Public-key Cryptography

uplinks:: Cryptography tags:: #lang/en #type/term Public-key Cryptography Public-key cryptography is a cryptographic system that uses pairs of mathematically related keys called a private key and a public key. Private keys are private — no one except its owner should know them. Public keys are publ…

2022-02-23
Public-key Cryptography

Public-key Encryption

uplinks:: Public-key Cryptography tags:: #type/term #lang/en Public-key Encryption Allows for Secure Communication of information without needing an initial secure channel for transferring keys. The ElGamal public key encryption algorithm is based on the discrete logarithm problem and is closely re…

2022-02-23
Public-key Encryption

Satoshi Nakamoto

uplinks:: People tags:: #lang/en #type/people Satoshi Nakamoto The pseudonym of the creator of Bitcoin

2022-02-23
Satoshi Nakamoto

Secure Communication

uplinks:: Cryptography tags:: #lang/en Secure Communication Before Public-key Cryptography existed, there is a need for a secure channel for key delivery before encrypted messages can be exchanged over an insecure channel. Public-key Cryptography allows for secure communication without needing a se…

2022-02-23
Secure Communication

Set (mathematics)

uplinks:: Set Theory tags:: #lang/en #type/term Set (mathematics) A set is a collection of elements An element can be any mathematical objects: numbers, symbols, points in space, lines, other geometrical shapes, variables, or other sets References https://en.wikipedia.org/wiki/Set_(mathematics) See…

2022-02-23
Set (mathematics)