Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
In transposition, the plaintext letters are
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
417
For n input bits the number of substitution patterns are
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
444
Encryption transformations are known as
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
380
Cipher system can be solved effectively by statistically using
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
419
In Merkle Hellman method same key is used for encryption and decryption
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
427
Merkle hellman is a symmetric cryptosystem
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
466
Knapsack problem can be solved by
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
416
A set of numbers is called as super increasing if
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
436
A cryptographic hash function has variable output length
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
399
Examples of hash functions are
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
420
Which algorithm can be used to sign a message?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
403
Which has a key length of 128 bits?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
423
Which are called the block ciphers?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
437
Total:
11022
Previous
584
585
586
587
588
Next
Go