Approximate String Matching
/əˈprɑksɪmət strɪŋ ˈmætʃɪŋ/
noun — "finding near matches between strings."
Damerau-Levenshtein
/ˌdæməˌraʊ ˌlɛvə(n)ˈʃtaɪn/
noun — "an enhanced string difference metric allowing transpositions."
Levenshtein Distance
/ˌlɛvə(n)ˈʃtaɪn ˈdɪstəns/
noun — "a metric for measuring string differences."
Scheduling Algorithms
/ˈskɛdʒʊlɪŋ ˈælɡərɪðəmz/
noun — "methods to determine which task runs when."
Turbo Codes
/ˈtɜːrboʊ koʊdz/
noun … “Iterative error-correcting codes approaching channel capacity.”
Low-Density Parity-Check
/ˌɛl diː piː siː/
noun … “Sparse code for near-Shannon-limit error correction.”
Cipher-based Message Authentication Code
/siː-mæk/
noun — "the cryptographic signature that proves a message hasn’t been tampered with."
CMAC, short for Cipher-based Message Authentication Code, is a cryptographic algorithm used to verify the integrity and authenticity of messages. It generates a fixed-size tag from a variable-length message using a block cipher, such as AES, ensuring that any alteration in the message can be detected.
Hash function
/hæʃ ˈfʌŋk.ʃən/
noun — "a function that converts data into a fixed-size digital fingerprint."
Hash Function is a mathematical algorithm that transforms input data of arbitrary length into a fixed-size value, called a hash or digest. This process is deterministic, meaning the same input always produces the same hash, but even a tiny change in input drastically changes the output. Hash Functions are widely used in data integrity verification, cryptography, digital signatures, password storage, and blockchain technologies.
Cryptography
/ˈkrɪp.təˌɡræ.fi/
noun — "the art and science of keeping information secret and verifiable."
Cryptography is the study and practice of techniques for securing communication and data from unauthorized access, manipulation, or interception. It involves transforming readable data (plaintext) into an encoded form (ciphertext) using mathematical algorithms and keys, ensuring confidentiality, integrity, authentication, and non-repudiation. Cryptography underpins secure digital communication, online banking, blockchain systems, and password protection.
Reed-Solomon
/riːd ˈsɒləmən/
noun — "an error-correcting code that protects data against burst errors by adding redundant symbols."