Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
In transposition, the plaintext letters are
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
452
For n input bits the number of substitution patterns are
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
510
Encryption transformations are known as
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
417
Cipher system can be solved effectively by statistically using
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
460
In Merkle Hellman method same key is used for encryption and decryption
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
463
Merkle hellman is a symmetric cryptosystem
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
507
Knapsack problem can be solved by
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
453
A set of numbers is called as super increasing if
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
476
A cryptographic hash function has variable output length
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
439
Examples of hash functions are
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
455
Which algorithm can be used to sign a message?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
442
Which has a key length of 128 bits?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
467
Which are called the block ciphers?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
477
Total:
11022
Previous
584
585
586
587
588
Next
Go