Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
Data compression includes
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
446
For digital signatures private key cryptosystem is used
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
452
Public key cryptosystem is used for the encryption of
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
430
Pretty good privacy (PGP) security system uses
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
429
Euler’s totient function is determined by
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
846
Public key cryptosystem is also known as
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
431
Which should be kept as a secret in public key cryptosystem?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
453
Public key cryptosystem uses same key for both encryption and decryption
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
515
Synchronous ciphers uses
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
490
In which method, key-stream is generated independently?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
456
In stream encryption, the key sequence repeats itself
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
449
In cipher feedback method, encryption is done on
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
427
The substitution of the letters are done
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
443
Total:
11022
Previous
583
584
585
586
587
Next
Go