Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
Data compression includes
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
415
For digital signatures private key cryptosystem is used
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
415
Public key cryptosystem is used for the encryption of
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
400
Pretty good privacy (PGP) security system uses
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
398
Euler’s totient function is determined by
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
674
Public key cryptosystem is also known as
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
397
Which should be kept as a secret in public key cryptosystem?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
420
Public key cryptosystem uses same key for both encryption and decryption
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
470
Synchronous ciphers uses
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
447
In which method, key-stream is generated independently?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
415
In stream encryption, the key sequence repeats itself
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
406
In cipher feedback method, encryption is done on
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
394
The substitution of the letters are done
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
409
Total:
11022
Previous
583
584
585
586
587
Next
Go