Discover

Cryptography

Hash Algorithms Overview and Evolution
37 questions
Key Distribution and Session Key Management
50 questions
Alan Turing and the Enigma Machine
6 questions
Enigma Code Breaking History
8 questions

Enigma Code Breaking History

CushyCynicalRealism avatar
CushyCynicalRealism
Cryptographic Hash Functions
13 questions
Decoding Symbolic Languages
73 questions
Secure Computation and Yao's Protocol
38 questions
Criptografía y función HASH
29 questions

Criptografía y función HASH

DistinguishedMagnolia6482 avatar
DistinguishedMagnolia6482
Public-Key Encryption
43 questions

Public-Key Encryption

CaptivatingSymbol6047 avatar
CaptivatingSymbol6047
Kryptografische Hashfunktionen
0 questions
Sécurité Informatique: Certificat Numérique
16 questions
AES and DES Encryption Standards Quiz
6 questions
ElGamal Algorithm Basics
7 questions
Symmetric Encryption Keys Quiz
5 questions

Symmetric Encryption Keys Quiz

FeatureRichSydneyOperaHouse avatar
FeatureRichSydneyOperaHouse
Confidentiality and Integrity Measures Quiz
14 questions
Understanding Harmonic Motion and Sound
10 questions
Decoding Challenge
5 questions

Decoding Challenge

HeartfeltSagacity avatar
HeartfeltSagacity
Unlocking History
8 questions

Unlocking History

ObtainableForest avatar
ObtainableForest
chapter 6
36 questions

chapter 6

FruitfulJadeite2991 avatar
FruitfulJadeite2991
Network Security I Lecture 7
15 questions

Network Security I Lecture 7

EnergyEfficientIndicolite avatar
EnergyEfficientIndicolite
Matrices Overview and Operations Quiz
12 questions