- Cardinality, [1]
- Carmichael number, [1]
- Cell
- Certificate, [1]
- Chain rule
- Chebyshev's inequality, [1], [2]
- Chernoff bounding technique, [1]
- Chernoff bounds, [1], [2]
-
Chernoff-Hoeffding bounds
-
see Hoeffding's inequality
- Chomsky hierarchy
- Church-Turing thesis
- Ciphertext
- Circuit satisfiability
- Classical computer
- Clause, [1]
- Clique, [1]
- CLIQUE (language), [1]
- Closed
- Closest-pair problem
-
CNF
-
see Conjunctive normal form
- Co-recognizable
- Code
- Combined-greedy algorithm
-
see also Knapsack problem
- Complement
- Complete graph, [1], [2]
- Completeness
-
Complexity
- Complexity class
|
- Compression
- Computable function
- Computational security, [1]
- Computational step
- Concentration bounds, [1], [2]
- Conditional probability
- Conditional security
- Confidence level
- Confidentiality, [1]
- Configuration, [1]
- Congruence
- Conjunctive normal form, [1]
- Connected
- coNP
- Context-free language
- Context-sensitive language
- Convex function
- Cook-Levin theorem, [1], [2]
- Coprime, [1], [2], [3]
- coRP (complexity class)
- Countable
- Countably infinite
-
Cover
-
Crossing edge
- Cryptography
- asymmetric
- ciphertext
- Diffie-Hellman, [1], [2], [3]
- Diffie-Hellman assumption, [1]
- discrete logarithm assumption, [1]
- ElGamal
- factorization hardness assumption
- Kerckhoff's principle, [1]
- key
- key exchange, [1]
- one-time pad
- padding, [1]
- plaintext
- post-quantum
- private key, [1], [2], [3]
- public key, [1], [2], [3]
- public-key cryptosystem
- RSA
- RSA assumption
- RSA encryption
- RSA signature
- spoofing
- statistical attack
- symmetric, [1]
- Cut
- Cycle
|