Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
The International Data Encryption Algorithm (IDEA) was developed by
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
473
For RSA to work, the value of P must be less than the value of
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
492
An encryption algorithm transforms the plaintext into
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
483
In Cryptography, the input bits are rotated to right or left in
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
490
In Cryptography, the original message, before being transformed, is called
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
460
The Advanced Encryption Standard (AES), has three different configurations with respect to the number of rounds and
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
501
A substitution cipher replaces one symbol with
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
509
The cryptography algorithms (ciphers) are divided into
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
489
DES stands for
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
494
The heart of Data Encryption Standard (DES), is the
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
476
The substitutional cipers are
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
470
The shift cipher is sometimes referred to as the
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
492
In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
535
Total:
11022
Previous
592
593
594
595
596
Next
Go