In the lexicon or glossary explains abylonsoft topics of general interest around the offered software products, computers and technology. The column with the letter Z contains 2 entries.
Zero-Knowledge procedures are suitable for convincing a communication partner that you know a secret "G" without communicating knowledge about "G". Two sets of secret and public keys are used for this purpose. Finally, authentication is carried out using a challenge-response protocol repeated several times.
When "zipping" or compressing, the amount of digital data is reduced by removing superfluous information. This saves disk space and bandwidth during data transfer. In data compression, a distinction is made between lossless and lossless methods. As a rule, decompression should completely restore the original file. In contrast, there are also cases where unimportant parts of the file are irrevocably removed and can no longer be fully restored. Lossy compression is used, for example, for sound files in MP3 format and for image files in JPEG format.
see also: Data Compression
Please use our support form for support requests Support form!