Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
In transposition, the plaintext letters are
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
455
For n input bits the number of substitution patterns are
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
515
Encryption transformations are known as
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
421
Cipher system can be solved effectively by statistically using
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
464
In Merkle Hellman method same key is used for encryption and decryption
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
466
Merkle hellman is a symmetric cryptosystem
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
512
Knapsack problem can be solved by
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
457
A set of numbers is called as super increasing if
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
481
A cryptographic hash function has variable output length
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
446
Examples of hash functions are
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
460
Which algorithm can be used to sign a message?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
446
Which has a key length of 128 bits?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
472
Which are called the block ciphers?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
482
Total:
11022
Previous
584
585
586
587
588
Next
Go