Discrete logarithm/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Jitse Niesen
(start)
 
No edit summary
 
Line 14: Line 14:
{{r|Diffie-Hellman}}
{{r|Diffie-Hellman}}
{{r|Integer factorization}}
{{r|Integer factorization}}
==Articles related by keyphrases (Bot populated)==
{{r|Diffie-Hellman}}
{{r|Asymmetric key cryptography}}
{{r|Ike (disambiguation)}}
{{r|Data structure}}

Latest revision as of 16:00, 7 August 2024

This article is developed but not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Discrete logarithm.
See also changes related to Discrete logarithm, or pages that link to Discrete logarithm or to this page or whose text contains "Discrete logarithm".

Parent topics

Other related topics

  • Logarithm [r]: Inverse of exponentiation, as subtraction is the inverse of addition and division is the inverse of multiplication. [e]
  • Cyclic group [r]: A group consisting of the powers of a single element. [e]
  • Quantum computing [r]: A Quantum computer manipulates coherence for parallel computing. [e]
  • Diffie-Hellman [r]: A technique that allows two parties to safely establish a shared secret for use as a cryptographic key, even if someone is eavesdropping on their interaction. It requires that the parties have some means of authentication to be sure they are talking to the right person. [e]
  • Integer factorization [r]: Add brief definition or description

Articles related by keyphrases (Bot populated)

  • Diffie-Hellman [r]: A technique that allows two parties to safely establish a shared secret for use as a cryptographic key, even if someone is eavesdropping on their interaction. It requires that the parties have some means of authentication to be sure they are talking to the right person. [e]
  • Asymmetric key cryptography [r]: A category of cryptographic techniques, which greatly simplify key management, which are based on mathematically related key pairs, such that the "public" key can be used to encrypt and be freely available, and only the holder of the "private" key can decrypt the message [e]
  • Ike (disambiguation) [r]: Add brief definition or description
  • Data structure [r]: A means of specifying how information is arranged on storage media for processing. [e]