Knowledge (XXG)

:Articles for deletion/One-way security - Knowledge (XXG)

Source ๐Ÿ“

124: 396: 259:
The term used in that article is "one-way" security, which is a description of the method, not a term for the cryptographic technology. The paper is referring to
379: 91: 86: 95: 17: 78: 298: 245: 195: 433: 36: 361: 340: 180: 47: 312:
Okay, there is at least one instance of the term being used in the field of cryptography. A redirect wouldn't hurt.
432:
Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a
373: 35:
Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a
414: 386: 352: 321: 303: 272: 250: 220: 200: 168: 144: 60: 140: 82: 409: 294: 287: 284: 241: 234: 191: 184: 56: 365: 348: 317: 268: 216: 29:
The following discussion is an archived debate of the proposed deletion of the article below.
403: 260: 74: 66: 52: 159: 132: 344: 313: 264: 212: 282: 208: 112: 153:
Relisted to generate a more thorough discussion so that consensus may be reached.
136: 230: 183:, if anyone ever finds a reference they can restore the article. -- 426:
The above discussion is preserved as an archive of the debate.
211:
disagrees, appears to be made up term. Redirect unnecessary.
339:
Agree that this is a made up term for a real technology.
119: 108: 104: 100: 343:
is a much more complete article about the same topic.
131:
Article is unreferenced for over two years, fails the
158:Please add new comments below this notice. Thanks, 39:). No further edits should be made to this page. 436:). No further edits should be made to this page. 364:, for which the title is a neologism. Erik the 397:list of Computing-related deletion discussions 8: 281:Are either of these what you have in mind? 229:I'll see your google search and raise you 395:: This debate has been included in the 18:Knowledge (XXG):Articles for deletion 7: 24: 1: 415:14:01, 21 August 2008 (UTC) 387:18:04, 20 August 2008 (UTC) 362:Cryptographic hash function 353:05:42, 20 August 2008 (UTC) 341:Cryptographic hash function 322:20:49, 20 August 2008 (UTC) 304:18:26, 20 August 2008 (UTC) 273:17:57, 20 August 2008 (UTC) 251:15:14, 20 August 2008 (UTC) 221:21:37, 19 August 2008 (UTC) 201:18:31, 19 August 2008 (UTC) 181:cryptographic hash function 169:17:13, 19 August 2008 (UTC) 145:08:56, 14 August 2008 (UTC) 61:17:33, 25 August 2008 (UTC) 48:cryptographic hash function 453: 429:Please do not modify it. 32:Please do not modify it. 133:verifiability policy 44:The result was 417: 400: 385: 261:one-way functions 171: 444: 431: 412: 406: 401: 391: 382: 376: 371: 368: 360:and redirect to 302: 290: 249: 237: 199: 187: 166: 157: 155: 122: 116: 98: 75:One-way security 67:One-way security 34: 452: 451: 447: 446: 445: 443: 442: 441: 440: 434:deletion review 427: 410: 404: 380: 374: 366: 292: 288: 239: 235: 231:one of its hits 189: 185: 160: 151: 118: 89: 73: 70: 37:deletion review 30: 22: 21: 20: 12: 11: 5: 450: 448: 439: 438: 421: 419: 418: 389: 355: 333: 332: 331: 330: 329: 328: 327: 326: 325: 324: 307: 306: 276: 275: 254: 253: 224: 223: 203: 173: 172: 156: 148: 129: 128: 69: 64: 42: 41: 25: 23: 15: 14: 13: 10: 9: 6: 4: 3: 2: 449: 437: 435: 430: 424: 423: 422: 416: 413: 407: 398: 394: 390: 388: 383: 377: 369: 363: 359: 356: 354: 350: 346: 342: 338: 335: 334: 323: 319: 315: 311: 310: 309: 308: 305: 300: 296: 291: 285: 283: 280: 279: 278: 277: 274: 270: 266: 262: 258: 257: 256: 255: 252: 247: 243: 238: 232: 228: 227: 226: 225: 222: 218: 214: 210: 207: 204: 202: 197: 193: 188: 182: 178: 175: 174: 170: 167: 165: 164: 154: 150: 149: 147: 146: 142: 138: 134: 126: 121: 114: 110: 106: 102: 97: 93: 88: 84: 80: 76: 72: 71: 68: 65: 63: 62: 58: 54: 50: 49: 40: 38: 33: 27: 26: 19: 428: 425: 420: 392: 357: 336: 205: 176: 162: 161: 152: 130: 46:redirect to 45: 43: 31: 28: 405:Fabrictramp 411:talk to me 289:Explodicle 236:Explodicle 186:Explodicle 53:PhilKnight 163:Wizardman 345:Wronkiew 314:Wronkiew 265:Wronkiew 213:MediaMob 177:Redirect 125:View log 92:protect 87:history 381:CAESAR 358:Delete 337:Delete 209:Google 206:Delete 137:Stifle 120:delete 96:delete 123:) โ€“ ( 113:views 105:watch 101:links 16:< 393:Note 349:talk 318:talk 269:talk 233:. -- 217:talk 141:talk 109:logs 83:talk 79:edit 57:talk 402:-- 399:. 375:AVE 367:Red 179:to 408:| 370:2 351:) 320:) 286:-- 271:) 263:. 219:) 143:) 135:. 111:| 107:| 103:| 99:| 94:| 90:| 85:| 81:| 59:) 51:. 384:) 378:ยท 372:( 347:( 316:( 301:) 299:C 297:/ 295:T 293:( 267:( 248:) 246:C 244:/ 242:T 240:( 215:( 198:) 196:C 194:/ 192:T 190:( 139:( 127:) 117:( 115:) 77:( 55:(

Index

Knowledge (XXG):Articles for deletion
deletion review
cryptographic hash function
PhilKnight
talk
17:33, 25 August 2008 (UTC)
One-way security
One-way security
edit
talk
history
protect
delete
links
watch
logs
views
delete
View log
verifiability policy
Stifle
talk
08:56, 14 August 2008 (UTC)
Wizardman
17:13, 19 August 2008 (UTC)
cryptographic hash function
Explodicle
T
C
18:31, 19 August 2008 (UTC)

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

โ†‘