Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • #REDIRECT [[Symmetric key cryptography]]
    40 bytes (4 words) - 05:38, 2 November 2008
  • {{r|Symmetric key cryptography}}
    657 bytes (85 words) - 17:19, 11 January 2010
  • {{r|Symmetric key cryptography}}
    398 bytes (43 words) - 20:00, 29 July 2010
  • '''Symmetric key cryptography''' uses the same key for both [[cipher#Encryption and decryption=|encryptio
    4 KB (546 words) - 05:48, 8 April 2024
  • {{r|Symmetric key cryptography}}
    547 bytes (70 words) - 11:35, 11 January 2010
  • {{r|Symmetric key cryptography}}
    1 KB (173 words) - 14:49, 4 April 2024
  • {{r|Symmetric key cryptography}}
    973 bytes (125 words) - 14:41, 18 March 2024
  • {{r|Symmetric key cryptography}}
    784 bytes (100 words) - 14:41, 18 March 2024
  • ...yptosystems''' combine [[public key]] (asymmetric) [[cryptography]] with [[Symmetric key cryptography|secret key]] (symmetric) techniques such as [[block cipher]]s, [[stream cip
    3 KB (544 words) - 05:49, 8 April 2024
  • {{r|Symmetric key cryptography}}
    597 bytes (79 words) - 11:25, 11 January 2010
  • Auto-populated based on [[Special:WhatLinksHere/Symmetric key cryptography]]. Needs checking by a human.
    587 bytes (76 words) - 20:45, 11 January 2010
  • | pagename = Symmetric key cryptography | abc = Symmetric key cryptography
    2 KB (230 words) - 10:56, 28 February 2010
  • Symmetric two-way encryption, also known as ''[[Symmetric key cryptography|private key]]'' encryption, is where both the sender and the receiver use t
    5 KB (879 words) - 09:41, 28 September 2023
  • ...h encrypted ''and'' decrypted. One approach is called ''secret key'' or [[symmetric key cryptography]], in which the sender encrypts with a secret key and the receiver must hav [[Symmetric key cryptography]] requires only one key. That key can be used either to encrypt or decrypt
    12 KB (1,872 words) - 06:17, 16 December 2008
  • ...at puts real data only in the high six bits of an 8-bit pixel. Generally [[symmetric key cryptography]] is used in such applications. For example, when a media company embeds a
    11 KB (1,766 words) - 09:26, 31 October 2015
  • {{main|Symmetric key cryptography}} ...l the 1970s, all (publicly known) cryptosystems used '''secret key''' or [[symmetric key cryptography]] methods. In such a system, there is only one secret key for a message; th
    28 KB (4,396 words) - 06:22, 16 December 2008
  • ...l the 1970s, all (publicly known) cryptosystems used '''secret key''' or [[symmetric key cryptography]] methods. In such a system, there is only one key for a message; that key
    52 KB (8,332 words) - 05:49, 8 April 2024
  • [[Symmetric key cryptography|Private key encryption]] requires only one key. That key can be used eithe
    51 KB (7,594 words) - 02:25, 1 April 2024
  • [[Symmetric key cryptography|Private key encryption]] requires only one key. That key can be used eithe
    52 KB (7,723 words) - 02:25, 1 April 2024
  • ...tosystem]]s; these combine [[public key]] (asymmetric) cryptography with [[symmetric key cryptography | secret key]] (symmetric) techniques such as block ciphers or [[stream cip
    53 KB (8,371 words) - 05:48, 8 April 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)