Discover

Cryptographic Hashes

Transposition Ciphers Overview
8 questions

Transposition Ciphers Overview

ExaltingThermodynamics1013 avatar
ExaltingThermodynamics1013
Introduction to Polyalphabetic Ciphers
8 questions

Introduction to Polyalphabetic Ciphers

ExaltingThermodynamics1013 avatar
ExaltingThermodynamics1013
Classical Encryption Techniques Quiz
29 questions
Introduction to Number Systems and Compression
5 questions
Hash Algorithms Overview and Evolution
37 questions
Key Distribution and Session Key Management
50 questions
Alan Turing and the Enigma Machine
6 questions
Enigma Code Breaking History
8 questions

Enigma Code Breaking History

CushyCynicalRealism avatar
CushyCynicalRealism
Decoding Symbolic Languages
73 questions
Secure Computation and Yao's Protocol
38 questions
Criptografía y función HASH
29 questions

Criptografía y función HASH

DistinguishedMagnolia6482 avatar
DistinguishedMagnolia6482
Public-Key Encryption
43 questions

Public-Key Encryption

CaptivatingSymbol6047 avatar
CaptivatingSymbol6047
Parte 23.
25 questions

Parte 23.

ThumbsUpObsidian8119 avatar
ThumbsUpObsidian8119
Sécurité Informatique: Certificat Numérique
16 questions
Computer Security Basics
19 questions

Computer Security Basics

RiskFreeViolin9070 avatar
RiskFreeViolin9070
AES and DES Encryption Standards Quiz
6 questions
ElGamal Algorithm Basics
7 questions
Confidentiality and Integrity Measures Quiz
14 questions
Understanding Harmonic Motion and Sound
10 questions
Decoding Challenge
5 questions

Decoding Challenge

HeartfeltSagacity avatar
HeartfeltSagacity
Unlocking History
8 questions

Unlocking History

ObtainableForest avatar
ObtainableForest
chapter 6
36 questions

chapter 6

FruitfulJadeite2991 avatar
FruitfulJadeite2991
Network Security I Lecture 7
15 questions

Network Security I Lecture 7

EnergyEfficientIndicolite avatar
EnergyEfficientIndicolite
Matrices Overview and Operations Quiz
12 questions