Jump to content

Search the Community

Showing results for tags 'encrypt'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Community Central
    • Introductions & Farewells
    • Forum Announcements
    • Forum Feedback and Support
    • The Competition Zone
  • The Developer's Corner
    • Theory and Development
    • Recruitment
  • Game Development
    • Editor Support and Discussion
    • Programming
    • Tutorials
    • Workshop
  • Game Production
    • Games in Progress
    • Completed Games
    • Game Reviews
    • Archived Games -Projects that have been inactive for 12 months are stored here.
  • Resource Center
    • 2D Resources
    • 3D Models
    • RPG Maker
    • Audio
    • Resource Market
    • Developing Tools
  • Creative Area
    • Artwork Gallery
    • Music Room
    • Literature Library
    • Animation Theater
  • Off-topic
    • General Discussion
    • Role Playing And Forum Games

Blogs

  • Loki's Blog
  • Kirin's Blog
  • Cremno's Blog
  • Nelneo's Blog
  • silversatyr's Blog
  • Virtuous Blade Development Blog :: DISCONTINUED
  • Lone Barrel Works
  • Intrigue of the Crystals Development Blog
  • Princess Project
  • Endafy's Corner
  • Knightmare's Blog
  • The Septrian Voyager
  • Animated Battlers
  • Pikalyze's Apple Tree
  • Marshzd Film to RPG Blog
  • Guardian Spirits Status Blog
  • Shinsei Stuff
  • æ�±æ´‹ã‚¢ãƒˆãƒªã‚¨
  • Eve of Perception [RPGMakerMV] Devlog
  • Blood Boundary Development
  • Little Girl That Could dev blog
  • Alice - Human Sacrifice Blog
  • Brualrosian Empire
  • Bashar's Blog
  • Shin RPG Maker
  • ShinGamix's Ace.net Only Blog
  • UnDead Studios
  • tillypope's Blog
  • whitedahlia
  • Rusted Souls Project Blog
  • Somnium: Burning Ember Development Blog.
  • E. Rin's Blog
  • Mako Star's Blog
  • A Descent into the Maelström
  • Aarowaim's Blog
  • CubixPG's
  • Pokemon Planet Project
  • Uprising:The Blog
  • COOL TELOCH BLOG
  • Politics: The game project blog
  • MonDez's Custom Resources
  • BlueDragonGamers
  • CT Bolt's Blog
  • Cid Gaius' Blog
  • Cidiomar's Blog
  • monster311
  • Velvela Jade
  • Dark Horseman
  • Pocketmouse, Project: Blog
  • Looking for Artist
  • COVB Custom
  • Ravenith's Laboratory
  • The Ninth Life Gaming
  • Daniel Tom's Blog
  • Daniel Tom's Blog
  • Level 99
  • Blood Shadows Blog
  • PK8's Blog
  • It's Acezon
  • Saphire Action Battle System IV how do you make the player Die?!
  • jomarcenter gamer news blog
  • Random Designs~
  • Mini Game Ideas
  • A Mouthful Of Maus
  • Mundane's Blog
  • The Guardian's Wicked Cool Stuffs!
  • Script Request
  • Ultima - Virtuous
  • Deadwater's Blog
  • Alendalin RPG
  • Cait's Blog
  • Acer K Productions
  • Hyde's Development Journal
  • DWM2 Development Journal
  • ~Hikari No Uta~
  • => proceed to recycle bin
  • The8th's Journal
  • Face Emotions
  • Request on Tutorials Anyone?
  • estriole's Blog
  • NecromireGames Blog
  • Toheka's blog
  • Bluestar Blog
  • Upcoming Tutorials
  • Misadventures
  • Resource Blog
  • LunaWing118's Blog
  • My Game
  • A Masterpiece In Development
  • N.O.I.M.
  • Hey PL! (Passive Lion's Official VX Ace Blog)
  • RagingHobo's Blog
  • Arctic Fox's Blog
  • Yin's Blog
  • TDW's Blog
  • pxlgraphic- Official Blog
  • The Making of Zendir
  • Rowen's Blog: Okami project
  • Vintaisa:School magic
  • Elixia's Memoir Chamber
  • Progress Project
  • Realms of Eternity
  • Infernal Cauldron of Miscellany
  • The Making of Zendir 2
  • Hortator's Blog
  • Project Shotgun
  • kelchw2323's Blog
  • kelchw2323's Blog
  • Aesorian's Thingymajig
  • NewMarker's Blog
  • Dezz's Stuff!
  • Pixel Art
  • KilloZapit's Magical Fairyland
  • Zendir 1: The Director's Cut
  • Bá´€ssÒ“ire [â—£ â—¢]'s Blog
  • My sweet abyss
  • RuinLight's Blog
  • ohheart's Blog
  • Indy Star: Dev Log
  • Logic's Blog
  • Mark Juner
  • LunaWing118's Blog
  • The fall of equestria
  • chronicles of a gamer
  • Replication/Tutorials
  • King's & Heroes Dev Blog
  • Whistler Wolf's Blog
  • kaz's Blog
  • China Rgss Scripts
  • Draciarch Games' Blog
  • Modern's Goal
  • Z3R0's Blog
  • 7-continents worldwide travel
  • "The World After" in the Making.
  • DarthVollis' Blog
  • SMC Development Blog
  • ~Choco's Blog~
  • Thoughts
  • The Four Stones
  • The Zen
  • Maindric's Blog
  • icon's Unusual Ideas
  • kayden997 Gaming Moment
  • Jonnie's Blog!
  • RuinLight Blog
  • Wren's Blog
  • Axio Chronicles: Progress Report
  • Liphidain - The Record
  • Nightgazer Starlight's Blog
  • Thebigzumawinz's Blog
  • Orrgar's RPG Blog
  • SchnitzelLion's Blog/etc
  • SirBilly's Blog
  • The Guardian's "Project RPG"
  • Alufey's Blog
  • Zanara's Blog
  • Legend of Erthia - The Etheral Gate
  • Naruto RPG Blog
  • GreenSheepGo's Blog
  • siChainlinks' Blog
  • Haunted Robots Blog
  • A blog emerges.
  • HimeWorks
  • cHAOScythe's Blog
  • Aetra: The Blog
  • Soul of Sul
  • Tutorial Drafts
  • Tigerbite's Blog
  • I need a little help... (o.\\)
  • Project A
  • The Shadows of Splendor
  • Deej's Blog
  • From the studio...
  • Vos: Demon Eater
  • RuinLight's Blog
  • Project Pepé
  • Project: █████▌
  • LunaticZio's Blog
  • Vauge
  • ThunerzIX's Blog
  • Smokey's Blog
  • AlexanderK's Blog
  • Magic Warrior
  • VanillaCube's Blog
  • Eventing 101
  • wirt2650's Blog
  • Rabie's Vaccine
  • Ninja Wolf Blog
  • Grotaiche's Blog
  • Writing Competition
  • OtaEnt Studios
  • Totori's Blog
  • The Kokonut Tree
  • Universecoffee's Blog
  • Universecoffee's Blog
  • Judgement Journey : Develop Blog
  • OmegaDSX's Blog
  • CharmingDominion's Blog
  • Jay Heartay's Blog
  • Arfax Games Dev-Blog
  • Pandemonuim the game
  • Remains: Dream Paradise
  • Just Starting Out
  • dev[otion]
  • Taffer's Blog
  • Soft-Square's
  • OmegaDSX's Off site blog
  • Story Review
  • My Ideas
  • EVENavesT
  • Elementstormrpgteam's Blog
  • RavenTheOld's Blog
  • Unnamed Game Dev
  • The Arbitrators Series
  • Medicine Man
  • Laura Yeah Right's Blog
  • Stradar's Blog
  • Silvershore
  • Jonath4nC's Blog
  • xMikachux's Stuff
  • Cecillia's Blog
  • Liphidain Development Blog
  • Pixelated
  • animeforfun's Blog
  • Purogurama Project
  • Flora Development
  • animeforfun's Blog
  • anna trinh's Blog
  • DragonWing Studios Blog
  • Tangential
  • P3RR1N's Blog
  • Necromedes' Blog
  • Soul Attraction
  • Tsarmina's Ramblings
  • lastonealive111's Blog
  • privateer's Blog
  • Warhamme40k Extermination
  • Dead Island Reincarnate part 1 review
  • Murgianswordsman's Blog
  • Jungernaut's Status Updates
  • Dead island Reincarnate info
  • KevinFrost's Blog
  • The Ensnarer
  • InfectedChild's Blog
  • Cupcake293's Blog
  • Choco's Dev Blog
  • Something Witty
  • t h e j a y s t u d i o's Blog
  • Zeth-Almer's Blog
  • Blindga's Lounge
  • Yenok's Blog
  • Eroha Maximus Development Blog
  • General Douchebaggery
  • My RPG progress blog
  • Master of The Forge - Development Blog
  • Draaloff - a small artwork collection
  • Update Blog
  • Cazziuzz' Blog
  • Personal blog
  • Ramblings of a writer
  • Ocedic's Blog
  • Gump's Dev Blog
  • smashdaddy's Blog
  • Biwy's Scripts
  • Ooooh! A Blog!~
  • So yea...
  • Cakes Notebook
  • Questions about my game
  • Flaming Teddy Productions
  • JamTam Universe
  • Tales of Mysteania DEMO
  • Near Misses of the Mundane Sort
  • Patch game title WIP
  • Tales of Time
  • Is anyone willing to assist me?
  • EraYachi's ...*sigh*..."Blog"
  • Help and Advice Requested
  • Fallen Temple
  • QuizicalGin's Blog
  • Ace Academy in Action
  • Fairy, Fairy How Contrary
  • Post-apocalytpic Simulation
  • Tweaksource's Blog
  • McCrumple's Blog
  • Utopia Software
  • gaixareku's Blog
  • DH2 Productions' Blog
  • Palladinthug's Blog
  • magicmetal's life
  • AlliedG's Blog
  • JStewartMusic Blog
  • Attack on Diary
  • Jeff-Andonuts PLAYS SOME RPGMaker VX Ace GAMES!
  • The Thoughts of a Squirrel King
  • Kamalot_INC Presents
  • Crazy Lady with a Hammer!
  • Question About Damage Formulas
  • Wow, such blog!
  • Phantom Antiquary
  • My Game Days
  • ShadowSphere Entertainment
  • Quick Question with Victor's Battle System
  • OFFICAL HIREING LIST
  • UnDead Studios Archive
  • Big project, I need help
  • Welcome to Entropy
  • Tactical Game System
  • Under The Name Sanders
  • Otterlicious
  • ScottofNorth's RPG Journal
  • LukeRiley's Project:
  • DiaWulf here~
  • A Spark of Inspiration
  • Downwinds' Blog
  • Arctic Thunder Crunch
  • luwehazcu's Blog
  • Fake but real
  • Allusion's Blog
  • Preparing For Massive Crowdfunding
  • nicoleanderson's Blog
  • Light and the Dark, A Journal
  • Kuronekox's Blog
  • Tris Blog
  • Omniblacklight's Blog
  • Theolized Stuffs
  • Blood Heart Redemption Dev Blog
  • Sug's Blog
  • GameMaking Blogger TheAqib
  • An artist's scattered thoughts
  • CloudTheWolf's Blog
  • Malagar's RPG Dev Diary
  • PoorCollegeGuy's Blog
  • nanokan's Blog
  • Movie Review Blog
  • Minerva's Touhou Diary
  • GameCreations' Blog
  • insomnioid
  • Johnny's Corner
  • Rush2112's Blog
  • Cat`s and Lolipops
  • The Rock Music Blog
  • New Artwork!! :D
  • Wolf Engine
  • Ultim's Thoughts
  • NightWolf's Logo Hub
  • Arcane Blog
  • Lith's Corner
  • HTML & CSS Learning Diary
  • Freak's Games
  • ASOE - Asynchronous Online Engine
  • Dark Cloud RPG Maker Edition
  • Plague's Blurbs
  • An Errant Soul's Musings
  • Stellar Complex - Development Blog
  • Venya's Blog
  • Wish to the Stars development blog
  • A Writers Paradise
  • Project Aventice
  • Aljara~
  • Extreme edits
  • Concepts & Roughs
  • Hokobishu's Japanese Tea House
  • Yukijin's Storehouse
  • The Pantheon
  • Pixii Stix since 1986
  • The Manic Elf
  • Ramblin' Roccstar
  • Blogging and Things
  • Opal Starlight
  • Game Watch
  • Turt's Blog
  • minefan's development blog
  • Kotori-chan`s Review Adventures~
  • Vectra Productions
  • ~Diary of Wrath~
  • DMTK Stuffs
  • Ailuro's Blog
  • Omni Link's Blog
  • Scoosh's Blog
  • DavidFoxfire's Works in Progress
  • DJBailey on Sound, Life, Development
  • Tools of The Trade
  • Kaiso's Blog of ideas and art
  • ImAGirlUPerv's Blog
  • TimothyWhitcomb's Blog
  • Chaosian's Blog
  • Lex's Blog
  • Spooky Does Blog Stuff
  • @Monkeysnow55's Blog
  • Don't have a project title yet :x
  • TheCaliMack RPG (California Macky's Blog)
  • Point08's Blog
  • Emphasis Log
  • A World On Fire
  • Space game
  • Project Eden Dev Blog
  • Soul Eka
  • The Consensus' RMVX Ace Musings
  • Writer's Resource
  • Spectre's Freebies
  • Karsh's Developer Blog
  • AngelCou's Blog
  • Intelligent Debates/feelings/conversations
  • The scripting life of a big red dog
  • Realm of the Nine Palms
  • D'Art Blog
  • BHR development
  • Personal Blog
  • And A Random Blog Appears From The Shadows
  • [Project Log] Relic Hunter
  • LadyLemonGames' Diary
  • Takeo's Game Updates
  • Visual Novel Progress
  • Absolute Nonsense(The Good Kind XP)
  • My Precious Days
  • Wander Work Blog
  • upsidedownprtl's IGMC Blog
  • IGMC Entry
  • Joseph's Development Chatter
  • The Daily Apple
  • [Project Log] The Keeper of the Wards
  • Local Woman Creates Blog: Users React in a Rampage
  • JaiCrimson's Blog
  • Returning to RMVX
  • Vectra's Speeches
  • Monster's Den Blog
  • Firehawk Labs
  • gunsage's magical death metal unicorn apocalypse
  • LTN Games
  • EpicFILE Leisure Time
  • Personal Blog
  • Random Things
  • My small ideas
  • The Waffle of Gold! Development Blog!
  • Blithe's Bleh
  • Maki's Semi-Transparent Cube
  • thejaxinator's INAW3
  • ~Dia's Rant's, Comments, And Concerns of Today's World~
  • Development of Beyond the Dark
  • You walked into Shin's Room
  • Manga Gothic
  • My year with the dragon
  • Memoirs of a Space Traveler
  • The Bounty Hunters
  • Cookie ninja shares!
  • Balter's blog
  • Veryll Tavern
  • Random Postings
  • Devonair320's Blog
  • Green With It's Freedom-Land Field Guide
  • Thought-crime and Other Misdemeanours
  • Jaluna's Berry Bush
  • Character Showcase and Other Things
  • Khaos' Kavern
  • markA's Blog
  • Equestria
  • PixeLockeT Plays & Plugs
  • Jacklack3's Book Of Stuff
  • Paradox: The Dev Log
  • Scalvose: Demons and Dragons Progress Holder
  • KunLibertad's Blog
  • Development of STA-FDW
  • Decim Blog, and Other Things
  • Tales of the Clumsy Beginner
  • Shiggy's Lab of Randomness
  • Bunbunmaru News
  • Raymi's Blog
  • Shiggy's Blog
  • GameKirby's Blog
  • LewisDruid's Gaming Corner
  • Nirwanda's Corner
  • Jax's Game Log
  • ashm13's Blog
  • A Dog's Guide to Highwick
  • Jacob Mann's IIAW3
  • The Eddsworld Fangame(s?)
  • beh
  • As Time Takes Its Course
  • Tempest of Souls
  • Tochiko Island: Juju Talks to Herself (And Others)
  • Unfortunate Ideas
  • The Woodcutter's Daughter (dev corner)
  • Demon's Gate Progress Blog
  • Cleosetric's Journal
  • Cinder's Stuff
  • Project Iniquitous
  • Milton Monday Plays Something
  • Ac Games
  • Characters And Such
  • Gaming, Writing, and Music
  • GamePad DevBlog
  • CVincent's Blog
  • Cupid's Universe
  • The Lightsworn Devrambles
  • Tarq's Backlog
  • Iron Fortress
  • Chungsie's Dagger Thunder Poop
  • Straydog's Blog
  • DRC's Blog
  • The Book of Love: South Park Fanfiction
  • The Legend of Jerry Quiver: Dev Blog
  • Official Works
  • Cosmo's Development log and Process Anouncments
  • 9 Circles Casino & Hotel
  • The Hurst's Development... Thingy
  • Chibae's Blog
  • JesseO's Blog
  • Party Pals!
  • 'Lucid' Blog Thing I Think
  • Cryptic: Project Journal
  • Neryan's Bloggie >,<
  • Planned All Along
  • Planned All Along
  • Alphys Hedge's Blog
  • Nexus of Naoto
  • FluffexStudios' Blog
  • CAW Series
  • RGSS3 Rumbles
  • Journal of the Phoenix
  • Project Updates
  • Perang Cemen's Devil Boy Quest
  • Fleshport Development Blog
  • Amyrakunejo's Game Cabinet
  • Secret Project
  • "Crystal Crown" Devlog [RPG Maker MV]
  • Memory of the Fallen Leaves Demo 1.8 coming soon-ish
  • Delve into the Digital Embrace
  • Nira, the Experiment
  • Testing Blog
  • Loco's Loose Leaf Odyssey
  • CH2 - Afterword
  • Verdiløs Games
  • An it harm none do what ye will.
  • Eddsworld: Life After The End
  • Final Fantasy (Working Title)
  • Alva (not the skater)-A planet and world much like the one we know, or claim to...
  • The Freeman Gazette
  • Abby Freeman Makes A Game
  • Doin Stuff
  • My pointless thoughts
  • Loco's Odds and Ends

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Skype


Location


Interests

Found 1 result

  1. The complete microsoft word file can be downloaded here(as a raw file) Summary The whole password setup/change process is as follows: 1. The client inputs the user ID and its password in plaintext 2. A salt for hashing the password in plaintexts will be randomly generated 3. The password will be combined with a fixed pepper in the client software source code and the aforementioned salt, to be hashed in the client terminal by SHA3-512 afterwards 4. The hashed password as a hexadecimal number with 128 digits will be converted to a base 256 number with 64 digits, which will be repeated 8 times in a special manner, and then broken down into a list of 512 literals, each being either numeric literals 1 to 100 or any of the 156 named constants 5. Each of those 512 numeric literals or named constants will be attached with existing numeric literals and named constants via different ways and combinations of additions, subtractions, multiplications and divisions, and the whole attachment process is determined by the fixed pepper in the client software source code 6. The same attachment process will be repeated, except that this time it’s determined by a randomly generated salt in the client terminal 7. That list of 512 distinct roots, with the ordering among all roots and all their literal expressions preserved, will produce the resultant polynomial equation of degree 512 8. The resultant polynomial equation will be encoded into numbers and number separators in the client terminal 9. The encoded version will be encrypted by RSA-4096 on the client terminal with a public key there before being sent to the server, which has the private key 10. The server decrypts the encrypted polynomial equation from the client with its RSA-4096 private key, then decode the decrypted version in the server to recover the original polynomial equation, which will finally be stored there 11. The 2 aforementioned different salts will be encrypted by 2 different AES-256 keys in the client software source code, and their encrypted versions will be sent to the server to be stored there 12. The time complexity of the whole process, except the SHA3-512, RSA-4096 and AES-256, should be controlled to quadratic time The whole login process is as follows: 1. The client inputs the user ID and its password in plaintext 2. The client terminal will send the user ID to the server, which will send its corresponding salts for hashing the password in plaintexts and forming distinct roots respectively, already encrypted in AES-256 back to the client terminal, assuming that the user ID from the client does exist in the server(otherwise the login fails and nothing will be sent back from the server) 3. The password will be combined with a fixed pepper in the client software source code, and the aforementioned salt that is decrypted in the client terminal using the AES-256 key in the client software source code, to be hashed in the client terminal by SHA3-512 afterwards 4. The hashed password as a hexadecimal number with 128 digits will be converted to a base 256 number with 64 digits, which will be repeated 8 times in a special manner, and then broken down into a list of 512 literals, each being either numeric literals 1 to 100 or any of the 156 named constants 5. Each of those 512 numeric literals or named constants will be attached with existing numeric literals and named constants via different ways and combinations of additions, subtractions, multiplications and divisions, and the whole attachment process is determined by the fixed pepper in the client software source code 6. The same attachment process will be repeated, except that this time it’s determined by the corresponding salt sent from the server that is decrypted in the client terminal using a different AES-256 key in the client software source code 7. That list of 512 distinct roots, with the ordering among all roots and all their literal expressions preserved, will produce the resultant polynomial equation of degree 512 8. The resultant polynomial equation will be encoded into numbers and number separators in the client terminal 9. The encoded version will be encrypted by RSA-4096 on the client terminal with a public key there before being sent to the server, which has the private key 10. The server decrypts the encrypted polynomial equation from the client with its RSA-4096 private key, then decode the decrypted version in the server to recover the original polynomial equation 11. Whether the login will succeed depends on if the literal expression of the polynomial equation from the client exactly matches the expected counterpart already stored in the server 12. The time complexity of the whole process, except the SHA3-512, RSA-4096 and AES-256, should be controlled to quadratic time For an attacker trying to get the raw password in plaintext: 1. If the attacker can only sniff the transmission from the client to the server to get the encoded then encrypted version(which is then encrypted by RSA-4096) of the polynomial equation, the salt of its roots, and the counterpart for the password in plaintext, the attacker first have to break RSA-4096, then the attacker has to figure out the highly secret and obfuscated algorithm to decode those numbers and number separators into the resultant polynomial equation and the way its roots are attached by existing numeric literals and named constants 2. If the attacker has the resultant polynomial equation of degree 512, its roots must be found, but there’s no direct formula to do so analytically due to Abel-Ruffini theorem, and factoring such a polynomial with 156 different named constants efficiently is very, very complicated and convoluted 3. If the attacker has direct access to the server, the expected polynomial equation can be retrieved, but the attacker still has to solve that polynomial equation of degree 512 to find all its roots with the right ordering among them and all their correct literal expressions 4. If the attacker has direct access to the client software source codes, the pepper for hashing the password in plaintext, the pepper used on the polynomial equation roots, and the highly secret and obfuscated algorithm for using them with the salt counterparts can be retrieved, but it’s still far from being able to find all the roots of the expected polynomial equation of degree 512 5. If the attacker has all those roots, the right ordering among them and all their correct literal expressions still have to be figured out, and the salts and peppers for those roots has to be properly removed as well 6. If the attacker has all those roots with the right ordering among them, all their correct literal expressions, and salts and peppers on them removed, the attacker has effectively recovered the hashed password, which is mixed with salts and peppers in plaintext 7. The attacker then has to figure out the password in plaintext even with the hashing function, salt, pepper, and the highly secret and obfuscated algorithm that combines them known 8. Unless there are really efficient algorithms for every step involved, the time complexity of the whole process can be as high as factorial time 9. As users are still inputting passwords in plaintexts, dictionary attacks still work to some extent, but if the users are careless with their password strengths, then no amount of cryptography will be safe enough 10. Using numerical methods to find all the roots won’t work in most cases, because such methods are unlikely to find those roots analytically, let alone with the right ordering among them and all their right literal expressions, which are needed to produce the resultant polynomial equation with literal expressions exactly matching the expected one 11. Using rainbow tables won’t work well either, because such table would be way too large to be used in practice, due to the number of polynomial equations with degree 512 being unlimited in theory 12. Strictly speaking, the whole password encryption scheme isn’t a one-way function, but the time complexity needed for encryption compared to that for decryption is so trivial that this scheme can act like such a function Areas demanding further researches: 1. The time complexity for factoring a polynomial of degree n with named constants into n factors analytically 2. Possibilities of collisions from the ordering among all roots and all their different literal expressions 3. Existence of efficient algorithms on finding the right ordering among all roots and all their right literal expressions 4. Strategies on setting up the fixed peppers and generating random salts to form roots with maximum encryption strength Essentially, the whole approach on using polynomial equations for encryptions is to exploit equations that are easily formed by their analytical solution sets but very hard to solve analytically, especially when exact literal matches, rather than just mathematical identity, are needed to match the expected equations. So it’s not strictly restricted to polynomial equations with a very high degree, but maybe very high order partial differential equations with many variables, complex coefficients and functions accepting complex numbers can also work, because there are no known analytical algorithm on solving such equations yet, but analytical solutions are demanded to reproduce the same partial differential equations with exact literal matches, as long as performing partial differentiations analytically can be efficient enough.
×
Top ArrowTop Arrow Highlighted