Results 291 to 300 of about 87,772 (336)
Some of the next articles are maybe not open access.
2001
A spy operating in country X on behalf of country Y has the problem of communicating with his controller in such a way as to protect both himself and the contents of his messages. No matter how he sends his messages they will have to be ‘modified’ somehow so that their true meaning is hidden from anyone but the intended recipient.
openaire +2 more sources
A spy operating in country X on behalf of country Y has the problem of communicating with his controller in such a way as to protect both himself and the contents of his messages. No matter how he sends his messages they will have to be ‘modified’ somehow so that their true meaning is hidden from anyone but the intended recipient.
openaire +2 more sources
2009
A block cipher typically operates on a plaintext which is broken into separate blocks of fixed length. The cipher maps an n bit plaintext to an n bit ciphertext, using a secret key of some fixed size; the mapping function must be invertible, so decryption is accomplished by simply applying the inverse map to the ciphertext.
Pantelimon Stanica, Thomas W. Cusick
openaire +3 more sources
A block cipher typically operates on a plaintext which is broken into separate blocks of fixed length. The cipher maps an n bit plaintext to an n bit ciphertext, using a secret key of some fixed size; the mapping function must be invertible, so decryption is accomplished by simply applying the inverse map to the ciphertext.
Pantelimon Stanica, Thomas W. Cusick
openaire +3 more sources
2016 Electric Electronics, Computer Science, Biomedical Engineerings' Meeting (EBBT), 2016
The value of software is proportional to the value of quality. Quality is one of the elements of security. There are two basic concepts that basically contains the security elements it contains. When tested in terms of security software are basically just white-box testing can be used to test the internal structure and may only be used in the user's ...
YEŞİLTEPE, Mirsat+2 more
openaire +3 more sources
The value of software is proportional to the value of quality. Quality is one of the elements of security. There are two basic concepts that basically contains the security elements it contains. When tested in terms of security software are basically just white-box testing can be used to test the internal structure and may only be used in the user's ...
YEŞİLTEPE, Mirsat+2 more
openaire +3 more sources
Cryptologia, 1995
Questions Thomas Jefferson's attributed invention of the “cylinder cipher,” notes similar devices before and after his time, and introduces a “mystery device” of this nature in the National Cryptologic Museum, Fort George G. Meade MD.
openaire +2 more sources
Questions Thomas Jefferson's attributed invention of the “cylinder cipher,” notes similar devices before and after his time, and introduces a “mystery device” of this nature in the National Cryptologic Museum, Fort George G. Meade MD.
openaire +2 more sources
Introduction – A Revolutionary Cipher
2013Cryptology is the science of secret writing. It is made up of two halves; cryptography consists of the techniques for creating systems of secret writing and cryptanalysis encompasses the techniques of breaking them. Over the past 2,500 years, cryptology has developed numerous types of systems to hide messages and subsequently a rich vocabulary in which
openaire +2 more sources
The Mathematical Gazette, 2010
This article is written as a companion piece to the recent account of cryptography in [1]. The aim will be similar—to explain the meaning and principles of coding, give some implementations that are feasible at school and early undergraduate level, and give a flavour of the types of mathematics involved.2.
openaire +2 more sources
This article is written as a companion piece to the recent account of cryptography in [1]. The aim will be similar—to explain the meaning and principles of coding, give some implementations that are feasible at school and early undergraduate level, and give a flavour of the types of mathematics involved.2.
openaire +2 more sources
2017
It is September 2009 and the start of a new semester. Students have gathered for the first meeting of my New Politics, New Possibilities class at Cornish College of the Arts in Seattle, Washington. We are seated around a table and are going through the syllabus.
openaire +2 more sources
It is September 2009 and the start of a new semester. Students have gathered for the first meeting of my New Politics, New Possibilities class at Cornish College of the Arts in Seattle, Washington. We are seated around a table and are going through the syllabus.
openaire +2 more sources
CORRESPONDENCE IN CIPHER A CIPHER TYPEWRITER TRADE CATALOGUE
Cryptologia, 1991A description, from a trade catalog, of an early typewriter designed for use as a cryptographic machine, and the need for such a device, followed by excerpts from its patent.
openaire +2 more sources