Results 1 to 10 of about 127,583 (276)
Some of the next articles are maybe not open access.
2001
A spy operating in country X on behalf of country Y has the problem of communicating with his controller in such a way as to protect both himself and the contents of his messages. No matter how he sends his messages they will have to be ‘modified’ somehow so that their true meaning is hidden from anyone but the intended recipient.
openaire +2 more sources
A spy operating in country X on behalf of country Y has the problem of communicating with his controller in such a way as to protect both himself and the contents of his messages. No matter how he sends his messages they will have to be ‘modified’ somehow so that their true meaning is hidden from anyone but the intended recipient.
openaire +2 more sources
FASTA - A Stream Cipher for Fast FHE Evaluation
The Cryptographer's Track at RSA Conference, 2022C. Cid, John Petter Indrøy, H. Raddum
semanticscholar +1 more source
2009
A block cipher typically operates on a plaintext which is broken into separate blocks of fixed length. The cipher maps an n bit plaintext to an n bit ciphertext, using a secret key of some fixed size; the mapping function must be invertible, so decryption is accomplished by simply applying the inverse map to the ciphertext.
Pantelimon Stanica, Thomas W. Cusick
openaire +3 more sources
A block cipher typically operates on a plaintext which is broken into separate blocks of fixed length. The cipher maps an n bit plaintext to an n bit ciphertext, using a secret key of some fixed size; the mapping function must be invertible, so decryption is accomplished by simply applying the inverse map to the ciphertext.
Pantelimon Stanica, Thomas W. Cusick
openaire +3 more sources
Cryptologia, 1995
Questions Thomas Jefferson's attributed invention of the “cylinder cipher,” notes similar devices before and after his time, and introduces a “mystery device” of this nature in the National Cryptologic Museum, Fort George G. Meade MD.
openaire +2 more sources
Questions Thomas Jefferson's attributed invention of the “cylinder cipher,” notes similar devices before and after his time, and introduces a “mystery device” of this nature in the National Cryptologic Museum, Fort George G. Meade MD.
openaire +2 more sources
Introduction – A Revolutionary Cipher
2013Cryptology is the science of secret writing. It is made up of two halves; cryptography consists of the techniques for creating systems of secret writing and cryptanalysis encompasses the techniques of breaking them. Over the past 2,500 years, cryptology has developed numerous types of systems to hide messages and subsequently a rich vocabulary in which
openaire +2 more sources
The Mathematical Gazette, 2010
This article is written as a companion piece to the recent account of cryptography in [1]. The aim will be similar—to explain the meaning and principles of coding, give some implementations that are feasible at school and early undergraduate level, and give a flavour of the types of mathematics involved.2.
openaire +2 more sources
This article is written as a companion piece to the recent account of cryptography in [1]. The aim will be similar—to explain the meaning and principles of coding, give some implementations that are feasible at school and early undergraduate level, and give a flavour of the types of mathematics involved.2.
openaire +2 more sources
2017
It is September 2009 and the start of a new semester. Students have gathered for the first meeting of my New Politics, New Possibilities class at Cornish College of the Arts in Seattle, Washington. We are seated around a table and are going through the syllabus.
openaire +2 more sources
It is September 2009 and the start of a new semester. Students have gathered for the first meeting of my New Politics, New Possibilities class at Cornish College of the Arts in Seattle, Washington. We are seated around a table and are going through the syllabus.
openaire +2 more sources
Recommendation for Block Cipher Modes of Operation
, 2019Morris Dworkin
semanticscholar +1 more source
A Simple Cipher Governs DNA Recognition by TAL Effectors
Science, 2009M. Moscou, A. Bogdanove
semanticscholar +1 more source
Eckhart Review, 2003
(2003). Ciphers of Transcendence. Eckhart Review: Vol. 12, Papers and talks given at the Fifteenth Conftrence of the Eckhart Society, held at Plater College, Oxford, England, 23-25 August 2002, pp. 39-52.
openaire +2 more sources
(2003). Ciphers of Transcendence. Eckhart Review: Vol. 12, Papers and talks given at the Fifteenth Conftrence of the Eckhart Society, held at Plater College, Oxford, England, 23-25 August 2002, pp. 39-52.
openaire +2 more sources