This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 151 lines
!!! Overview[1] [2]
[{$pagename}] ([DEM] also seen as Data Encapsulation Scheme) also known as [data] hiding, is the mechanism whereby the [implementation] details of a class are kept hidden from the user.
The user can only perform a restricted set of operations on the hidden members of the class by executing special functions commonly called methods.
!! [Cryptography]
A (stateless) [{$pagename}] consists of three polynomial-time algorithms:
* the randomized key-generation algorithm produces a uniformly distributed [key]
* a [message] is encrypted under the [key] to produce the [ciphertext]
* a possessor of the [key] [decrypts|Decryption] the [ciphertext] to get back a [message]
!! [Object-oriented] programming
The wrapping of private data in classes in object-oriented programming languages
!! network protocol design
[OSI-Model] in network protocol design
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [Data_encapsulation|Wikipedia:Data_encapsulation|target='_blank'] - based on information obtained 2018-08-12-
* [#2] - [KEM/DEM technique for hybrid encryption|http://cryptowiki.net/index.php?title=KEM/DEM_technique_for_hybrid_encryption|target='_blank'] - based on information obtained 2018-08-12-