Login
Remember
Register
Ask a Question
Recent questions and answers in Cryptography
0
votes
0
answers
How often does Bitcoin ledger reconcile
asked
Sep 6, 2021
in
Cryptography
by
rajeshsharma
bitcoin-ledger-reconcile
0
votes
0
answers
Which of the following is important for Blockchain
asked
Sep 6, 2021
in
Cryptography
by
rajeshsharma
blockchain
0
votes
0
answers
What is the name of the first academic paper that describes bitcoin commonly referred to as?
asked
Sep 6, 2021
in
Cryptography
by
rajeshsharma
bitcoin-academic-paper
0
votes
0
answers
First step of Blockchain project implementation is?
asked
Sep 6, 2021
in
Cryptography
by
rajeshsharma
blockchain-project
0
votes
0
answers
What does a ledger in blockchain does?
asked
Sep 6, 2021
in
Cryptography
by
rajeshsharma
ledge-blockchain
0
votes
0
answers
Where is the bitcoin central server located?
asked
Sep 6, 2021
in
Cryptography
by
rajeshsharma
bitcoin-server
0
votes
0
answers
An orphan block is only created when 51% attack is successful
asked
Sep 6, 2021
in
Cryptography
by
rajeshsharma
orphan-block
0
votes
0
answers
What is the initial application for which Blockchain was designed?
asked
Sep 6, 2021
in
Cryptography
by
rajeshsharma
blockchain-application
0
votes
0
answers
How many new Bitcoins are created every day?
asked
Sep 6, 2021
in
Cryptography
by
rajeshsharma
bitcoin-creation
0
votes
0
answers
What time did Bitcoin Network Start?
asked
Sep 6, 2021
in
Cryptography
by
rajeshsharma
bitcoin-network
0
votes
0
answers
What is the impact of information leak for an organization?
asked
Sep 6, 2021
in
Cryptography
by
rajeshsharma
information-leak
0
votes
0
answers
What is not a ledger type considered by users in Blockchain?
asked
Sep 6, 2021
in
Cryptography
by
rajeshsharma
blockchain-ledger
0
votes
0
answers
A bitcoin address collision happens when 2 different payments are made at the same time to the same bitcoin address
asked
Sep 6, 2021
in
Cryptography
by
rajeshsharma
bitcoin-address
0
votes
0
answers
After 10 Minutes a new block is formed that contains latest transactions
asked
Sep 6, 2021
in
Cryptography
by
rajeshsharma
blockchain-transactions
+1
vote
0
answers
What does the block in the blockchain consist of?
asked
Sep 6, 2021
in
Cryptography
by
rajeshsharma
blockchain
0
votes
0
answers
What is the name of the famous Bitcoin exchange from Japan that collapsed in 2014?
asked
Sep 6, 2021
in
Cryptography
by
rajeshsharma
bitcoin-exchange
0
votes
0
answers
Cryptographic Hash Function transforms an arbitrary length of a fixed length string that act more or less as a Fingerprint of the document
asked
Sep 6, 2021
in
Cryptography
by
rajeshsharma
hash-function
0
votes
1
answer
Which one is DES?
answered
Sep 2, 2021
in
Cryptography
by
SakshiSharma
des
+1
vote
1
answer
Encryption system is?
answered
Sep 2, 2021
in
Cryptography
by
SakshiSharma
encryption
encryption-system
0
votes
1
answer
Which one is not a RC5 operation?
answered
Sep 2, 2021
in
Cryptography
by
SakshiSharma
rc5-operations
0
votes
1
answer
An asymmetric-key cipher uses
answered
Sep 2, 2021
in
Cryptography
by
SakshiSharma
asymmetric-key
0
votes
1
answer
Which one of the following protocol is used to secure HTTP connection?
answered
Sep 2, 2021
in
Cryptography
by
SakshiSharma
http-connection
0
votes
1
answer
Cryptography term is used to transforming messages to make them secure and to prevent from
answered
Sep 2, 2021
in
Cryptography
by
SakshiSharma
transforming-messages
0
votes
1
answer
Shift cipher is also referred to as the
answered
Sep 2, 2021
in
Cryptography
by
SakshiSharma
shift-cipher
+1
vote
1
answer
Which one is the Heart of Data Encryption Standard (DES)?
answered
Sep 2, 2021
in
Cryptography
by
SakshiSharma
data-encryption-standard
des
0
votes
1
answer
DES stands for…………………
answered
Sep 2, 2021
in
Cryptography
by
SakshiSharma
des
+1
vote
1
answer
Encryption algorithm is used to transforms plaintext into……………………….
answered
Sep 2, 2021
in
Cryptography
by
SakshiSharma
encryption
0
votes
1
answer
What is cipher in Cryptography ?
answered
Sep 2, 2021
in
Cryptography
by
SakshiSharma
cryptography-cipher
0
votes
1
answer
Which clipher is used for providing voice privacy in GSM cellular telephone protocol
answered
Sep 2, 2021
in
Cryptography
by
SakshiSharma
clipher
cipher
0
votes
1
answer
The message before being transformed, is
answered
Sep 2, 2021
in
Cryptography
by
SakshiSharma
message-transform
To see more, click for all the
questions in this category
.
Recent questions and answers in Cryptography
...