Discrete logarithm - Wikipedia
Discrete logarithm Discrete logarithm modulo 5, with base 2. In mathematics, for given real numbers and , the logarithm is a number such that . The discrete logarithm generalizes this …
Cryptographic hash function - Wikipedia
[8] Checksum algorithms, such as CRC-32 and other cyclic redundancy checks, are designed to meet much weaker requirements and are generally unsuitable as cryptographic hash functions. …
Lattice-based cryptography - Wikipedia
Security Lattice-based cryptographic constructions hold a great promise for public-key post-quantum cryptography. [38] Indeed, the main alternative forms of public-key cryptography are …
Modular arithmetic - Wikipedia
In cryptography, modular arithmetic directly underpins public key systems such as RSA and Diffie–Hellman, and provides finite fields which underlie elliptic curves, and is used in a variety …
Combinatorial optimization - Wikipedia
Combinatorial optimization problems can be viewed as searching for the best element of some set of discrete items; therefore, in principle, any sort of search algorithm or metaheuristic can …
Modular exponentiation - Wikipedia
The following is an example in pseudocode based on Applied Cryptography by Bruce Schneier. [2] The inputs base, exponent, and modulus correspond to b, e, and m in the equations given above.
List of unsolved problems in computer science - Wikipedia
External links Woeginger, Gerhard J. "Open problems around exact algorithms". Discrete Applied Mathematics. 156 (2008): 397–405. The RTA list of open problems – Open problems in …
ElGamal encryption - Wikipedia
In cryptography, the ElGamal encryption system is a public-key encryption algorithm based on the Diffie–Hellman key exchange. It was described by Taher Elgamal in 1985. [1]