Dataset Viewer
Auto-converted to Parquet Duplicate
text
stringlengths
27.2k
532k
source
stringlengths
71
964
"[Source: https://en.wikipedia.org/wiki/Fermat%27s_little_theorem]\nInnumber theory,Fermat's little (...TRUNCATED)
https://en.wikipedia.org/wiki/Commitment_scheme, https://en.wikipedia.org/wiki/RSA_(cryptosystem), https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation, https://en.wikipedia.org/wiki/Bluetooth#Security, https://en.wikipedia.org/wiki/Permutation, https://en.wikipedia.org/wiki/Global_System_for_Mobile_Communications, https://en.wikipedia.org/wiki/One-time_pad, https://en.wikipedia.org/wiki/IDEA_(cipher), https://en.wikipedia.org/wiki/GSM#Security, https://en.wikipedia.org/wiki/Elliptic_curve, https://en.wikipedia.org/wiki/3G#Security, https://en.wikipedia.org/wiki/Stirling_approximation, https://en.wikipedia.org/wiki/Stirling_numbers, https://en.wikipedia.org/wiki/Fermat%27s_little_theorem, https://en.wikipedia.org/wiki/Wired_Equivalent_Privacy#Authentication
"[Source: https://en.wikipedia.org/wiki/Elliptic_curve_cryptography]\nElliptic-curve cryptography(EC(...TRUNCATED)
https://en.wikipedia.org/wiki/Rabin_cryptosystem, https://en.wikipedia.org/wiki/Elliptic_curve_cryptography, https://en.wikipedia.org/wiki/Composite_number, https://en.wikipedia.org/wiki/Stream_cipher, https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange, https://en.wikipedia.org/wiki/Complexity_of_algorithms, https://en.wikipedia.org/wiki/Block_cipher#Modes_of_operation, https://en.wikipedia.org/wiki/Bluetooth#Pairing, https://en.wikipedia.org/wiki/Prime_number, https://en.wikipedia.org/wiki/ElGamal_encryption, https://en.wikipedia.org/wiki/Moore%27s_law, https://en.wikipedia.org/wiki/Bluetooth#Link_keys_and_encryption_keys, https://en.wikipedia.org/wiki/Intel, https://en.wikipedia.org/wiki/Discrete_logarithm, https://en.wikipedia.org/wiki/Euler%27s_totient_function
"[Source: https://en.wikipedia.org/wiki/Multiplicative_group_of_integers_modulo_n]\nInmodular arithm(...TRUNCATED)
https://en.wikipedia.org/wiki/Data_Encryption_Standard, https://en.wikipedia.org/wiki/Hash_function, https://en.wikipedia.org/wiki/Bluetooth, https://en.wikipedia.org/wiki/Public-key_cryptography, https://en.wikipedia.org/wiki/Multiplicative_group_of_integers_modulo_n, https://en.wikipedia.org/wiki/Group_(mathematics), https://en.wikipedia.org/wiki/Triple_DES, https://en.wikipedia.org/wiki/Merkle%E2%80%93Damg%C3%A5rd_construction, https://en.wikipedia.org/wiki/Birthday_paradox, https://en.wikipedia.org/wiki/Salt_(cryptography), https://en.wikipedia.org/wiki/Chinese_remainder_theorem, https://en.wikipedia.org/wiki/Password_hashing#Salting, https://en.wikipedia.org/wiki/Carmichael_number, https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access#WPA-TKIP, https://en.wikipedia.org/wiki/Isomorphism
"[Source: https://en.wikipedia.org/wiki/Encryption]\nIncryptography,encryption(more specifically,enc(...TRUNCATED)
https://en.wikipedia.org/wiki/Carmichael_function, https://en.wikipedia.org/wiki/Euler%27s_theorem, https://en.wikipedia.org/wiki/Multiplicative_group_of_integers_mod_n, https://en.wikipedia.org/wiki/Ideal_(ring_theory), https://en.wikipedia.org/wiki/Encryption, https://en.wikipedia.org/wiki/RSA_algorithm, https://en.wikipedia.org/wiki/Key_management, https://en.wikipedia.org/wiki/Group_theory, https://en.wikipedia.org/wiki/Cryptographic_hash_function, https://en.wikipedia.org/wiki/Authentication, https://en.wikipedia.org/wiki/One-time_password, https://en.wikipedia.org/wiki/S/Key, https://en.wikipedia.org/wiki/Public_key_cryptography, https://en.wikipedia.org/wiki/Invertible_element#In_the_context_of_modular_arithmetic, https://en.wikipedia.org/wiki/Galois_field
"[Source: https://en.wikipedia.org/wiki/Finite_field]\nInmathematics, afinite fieldorGalois field(so(...TRUNCATED)
https://en.wikipedia.org/wiki/Cyclic_group, https://en.wikipedia.org/wiki/MD4, https://en.wikipedia.org/wiki/Closed_set, https://en.wikipedia.org/wiki/Integer, https://en.wikipedia.org/wiki/Finite_field, https://en.wikipedia.org/wiki/Group_of_units, https://en.wikipedia.org/wiki/RC4, https://en.wikipedia.org/wiki/Radio-frequency_identification, https://en.wikipedia.org/wiki/MD5, https://en.wikipedia.org/wiki/Unit_(ring_theory), https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm, https://en.wikipedia.org/wiki/SHA-1, https://en.wikipedia.org/wiki/Password_strength#Dictionary_attack, https://en.wikipedia.org/wiki/RSA#Signature_generation_and_verification, https://en.wikipedia.org/wiki/Dictionary_attack
"[Source: https://en.wikipedia.org/wiki/AES]\nAESmost often refers to:\n\nAESmay also refer to:\n\n-(...TRUNCATED)
https://en.wikipedia.org/wiki/Pseudorandom_number_generator, https://en.wikipedia.org/wiki/Moore%27s_law#Implications, https://en.wikipedia.org/wiki/Brute-force_attack, https://en.wikipedia.org/wiki/Enigma_machine, https://en.wikipedia.org/wiki/AES, https://en.wikipedia.org/wiki/Confidentiality, https://en.wikipedia.org/wiki/Cryptography, https://en.wikipedia.org/wiki/HMAC, https://en.wikipedia.org/wiki/Galois/Counter_Mode, https://en.wikipedia.org/wiki/Message_authentication_code, https://en.wikipedia.org/wiki/Cipher, https://en.wikipedia.org/wiki/Rijndael, https://en.wikipedia.org/wiki/Bluetooth#Overview, https://en.wikipedia.org/wiki/Data_transmission, https://en.wikipedia.org/wiki/ElGamal_signature_scheme
"[Source: https://en.wikipedia.org/wiki/Collision_resistance]\nIncryptography,collision resistanceis(...TRUNCATED)
https://en.wikipedia.org/wiki/SIM_card, https://en.wikipedia.org/wiki/Birthday_problem, https://en.wikipedia.org/wiki/Galois_field#Finite_fields, https://en.wikipedia.org/wiki/Data_Encryption_Standard#Round_function, https://en.wikipedia.org/wiki/Finite_field#Construction_of_finite_fields, https://en.wikipedia.org/wiki/Cryptography#The_fundamental_trilogy, https://en.wikipedia.org/wiki/Brute-force_search, https://en.wikipedia.org/wiki/Kerckhoffs%27s_principle, https://en.wikipedia.org/wiki/Data_integrity, https://en.wikipedia.org/wiki/Birthday_attack, https://en.wikipedia.org/wiki/Advanced_Encryption_Standard, https://en.wikipedia.org/wiki/Second_preimage_attack, https://en.wikipedia.org/wiki/Vernam_cipher, https://en.wikipedia.org/wiki/Meet-in-the-middle_attack, https://en.wikipedia.org/wiki/Collision_resistance
"[Source: https://en.wikipedia.org/wiki/Elliptic_Curve_Diffie鈥揌ellman]\nElliptic-curve Diffie鈥揌e(...TRUNCATED)
https://en.wikipedia.org/wiki/Invertible_element#Definition_of_invertible_elements_in_modular_arithmetic, https://en.wikipedia.org/wiki/Key_size#Key_sizes_and_security, https://en.wikipedia.org/wiki/Factoring_problem, https://en.wikipedia.org/wiki/Bluetooth#Bluetooth_2.1, https://en.wikipedia.org/wiki/Modular_arithmetic, https://en.wikipedia.org/wiki/Elliptic_Curve_Diffie鈥揌ellman, https://en.wikipedia.org/wiki/Integers_modulo_n, https://en.wikipedia.org/wiki/Polynomial_ring, https://en.wikipedia.org/wiki/Coprime_integers, https://en.wikipedia.org/wiki/Wired_Equivalent_Privacy, https://en.wikipedia.org/wiki/Symmetric-key_algorithm#Key_length, https://en.wikipedia.org/wiki/E-passport, https://en.wikipedia.org/wiki/Chosen-ciphertext_attack, https://en.wikipedia.org/wiki/Man-in-the-middle_attack, https://en.wikipedia.org/wiki/Modulo_operation
"[Source: https://en.wikipedia.org/wiki/48_(number)]\n48(forty-eight) is thenatural numberfollowing(...TRUNCATED)
https://en.wikipedia.org/wiki/Preimage_attack, https://en.wikipedia.org/wiki/Ring_isomorphism, https://en.wikipedia.org/wiki/Keccak, https://en.wikipedia.org/wiki/Prime_power, https://en.wikipedia.org/wiki/Data_Encryption_Standard#Key_schedule, https://en.wikipedia.org/wiki/Fermat_primality_test, https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access#WPA2, https://en.wikipedia.org/wiki/Miller%E2%80%93Rabin_primality_test, https://en.wikipedia.org/wiki/Field_(mathematics), https://en.wikipedia.org/wiki/Double_DES, https://en.wikipedia.org/wiki/Information_security, https://en.wikipedia.org/wiki/Cyclic_redundancy_check, https://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm, https://en.wikipedia.org/wiki/Time-memory_tradeoff, https://en.wikipedia.org/wiki/48_(number)
"[Source: https://en.wikipedia.org/wiki/Group_theory#Finite_groups]\nInabstract algebra,group theory(...TRUNCATED)
https://en.wikipedia.org/wiki/Integer_factorization, https://en.wikipedia.org/wiki/Computational_complexity_theory, https://en.wikipedia.org/wiki/Tonelli%E2%80%93Shanks_algorithm, https://en.wikipedia.org/wiki/Group_homomorphism, https://en.wikipedia.org/wiki/Shannon's_theorem, https://en.wikipedia.org/wiki/A5/1, https://en.wikipedia.org/wiki/Extended_Euclidean_algorithm, https://en.wikipedia.org/wiki/Digital_certificate, https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Counter_mode, https://en.wikipedia.org/wiki/Jacobi_symbol, https://en.wikipedia.org/wiki/Exhaustive_search, https://en.wikipedia.org/wiki/Group_theory#Finite_groups, https://en.wikipedia.org/wiki/Homomorphism, https://en.wikipedia.org/wiki/Universal_Mobile_Telecommunications_System, https://en.wikipedia.org/wiki/Information_entropy
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
1