Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
Data compression includes
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
454
For digital signatures private key cryptosystem is used
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
456
Public key cryptosystem is used for the encryption of
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
434
Pretty good privacy (PGP) security system uses
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
441
Euler’s totient function is determined by
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
865
Public key cryptosystem is also known as
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
437
Which should be kept as a secret in public key cryptosystem?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
456
Public key cryptosystem uses same key for both encryption and decryption
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
518
Synchronous ciphers uses
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
494
In which method, key-stream is generated independently?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
459
In stream encryption, the key sequence repeats itself
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
454
In cipher feedback method, encryption is done on
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
431
The substitution of the letters are done
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
447
Total:
11022
Previous
583
584
585
586
587
Next
Go