Exam 4: A: Number Theory and Cryptography
Exam 1: The Foundations: Logic and Proofs18 Questions
Exam 1: A: the Foundations: Logic and Proofs201 Questions
Exam 2: Basic Structures: Sets, Functions, Sequences, Sums, Matrices5 Questions
Exam 2: A: Basic Structures: Sets, Functions, Sequences, Sums, Matrices210 Questions
Exam 3: Algorithms8 Questions
Exam 3: A: Algorithms54 Questions
Exam 4: Number Theory and Cryptography10 Questions
Exam 4: A: Number Theory and Cryptography149 Questions
Exam 5: Induction and Recursion10 Questions
Exam 5: A: Induction and Recursion51 Questions
Exam 6: Counting14 Questions
Exam 6: A: Counting155 Questions
Exam 7: Discrete Probability9 Questions
Exam 7: A: Discrete Probability50 Questions
Exam 8: Advanced Counting Techniques16 Questions
Exam 8: A: Advanced Counting Techniques124 Questions
Exam 9: Relations13 Questions
Exam 9: A: Relations72 Questions
Exam 10: Graphs14 Questions
Exam 10: A: Graphs131 Questions
Exam 11: Trees13 Questions
Exam 11: A: Trees94 Questions
Exam 12: Boolean Algebra11 Questions
Exam 12: A: Boolean Algebra67 Questions
Exam 13: Modeling Computation14 Questions
Exam 13: A: Modeling Computation67 Questions
Exam 14: Mathematics Problem Set: Set Theory, Number Theory, Combinatorics, and Boolean Algebra29 Questions
Select questions type
Explain why f(x) = (2x + 3) mod 26 would not be a good coding function.
(Short Answer)
4.9/5
(37)
suppose that a and b are integers, a ≡ 4 (mod 7), and b ≡ 6 (mod 7). Find the integer c with 0 ≤ c ≤ 6
such that
-
(Short Answer)
4.9/5
(37)
refer to an 8-digit student id at a large university. The eighth digit is a check
digit equal to the sum of the first seven digits modulo 7.
-Suppose the first digit of the student id X923 4562 is illegible (indicated by X). Can you tell what the first digit has to be?
(Short Answer)
4.7/5
(31)
determine whether each of the following "theorems" is true or false. Assume that a, b, c, d,
and m are integers with m > 1.
-
(True/False)
4.8/5
(46)
What is the shared key if Alice and Bob use the Diffie-Hellman key exchange protocol with the prime p = 67, the primitive root a = 7 of p = 67, with Alice choosing the secret integer k1 = 12 and Bob choosing the secret integer k2 = 25?
(Short Answer)
4.8/5
(39)
Encode the message "stop at noon" using the function f(x) = (x + 6) mod 26.
(Short Answer)
4.7/5
(32)
The cipher text LTDTLLWW was produced by encrypting a plaintext message using the Vigen`ere cipher with the key TEST. What is the plaintext message?
(Short Answer)
4.9/5
(37)
determine whether each of the following "theorems" is true or false. Assume that a, b, c, d,
and m are integers with m > 1.
-
(True/False)
4.9/5
(36)
Find the first five terms of the sequence of four-digit pseudorandom numbers generated by the middle square method starting with 1357.
(Short Answer)
4.9/5
(38)
Showing 81 - 100 of 149
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)