When.com Web Search

  1. Ads

    related to: puzzles that don't require internet security

Search results

  1. Results From The WOW.Com Content Network
  2. Cicada 3301 - Wikipedia

    en.wikipedia.org/wiki/Cicada_3301

    The puzzles focused heavily on data security, cryptography, steganography, and Internet anonymity. [ 8 ] [ 9 ] [ 10 ] It has been called "the most elaborate and mysterious puzzle of the Internet age", [ 11 ] and is listed as one of the "top 5 eeriest, unsolved mysteries of the Internet" by The Washington Post , [ 12 ] and much speculation ...

  3. List of impossible puzzles - Wikipedia

    en.wikipedia.org/wiki/List_of_impossible_puzzles

    This is a list of puzzles that cannot be solved. An impossible puzzle is a puzzle that cannot be resolved, either due to lack of sufficient information, or any number of logical impossibilities. 15 Puzzle – Slide fifteen numbered tiles into numerical order. It is impossible to solve in half of the starting positions.

  4. Merkle's Puzzles - Wikipedia

    en.wikipedia.org/wiki/Merkle's_Puzzles

    In cryptography, Merkle's Puzzles is an early construction for a public-key cryptosystem, a protocol devised by Ralph Merkle in 1974 and published in 1978. It allows two parties to agree on a shared secret by exchanging messages, even if they have no secrets in common beforehand.

  5. Discover the best free online games at AOL.com - Play board, card, casino, puzzle and many more online games while chatting with others in real-time.

  6. Notpron - Wikipedia

    en.wikipedia.org/wiki/Notpron

    It has been named as "the hardest riddle available on the internet". [3] Regarded as one of the first of the online puzzle game genre, Notpron follows a standard puzzle game layout, where the player is presented with a webpage containing a riddle and must find the answer to the riddle in order to proceed to the next webpage.

  7. Cryptogram - Wikipedia

    en.wikipedia.org/wiki/Cryptogram

    A cryptogram is a type of puzzle that consists of a short piece of encrypted text. [1] Generally the cipher used to encrypt the text is simple enough that the cryptogram can be solved by hand. Substitution ciphers where each letter is replaced by a different letter, number, or symbol are frequently used. To solve the puzzle, one must recover ...