Results 291 to 300 of about 87,772 (336)
Some of the next articles are maybe not open access.

Ciphers for spies

2001
A spy operating in country X on behalf of country Y has the problem of communicating with his controller in such a way as to protect both himself and the contents of his messages. No matter how he sends his messages they will have to be ‘modified’ somehow so that their true meaning is hidden from anyone but the intended recipient.
openaire   +2 more sources

Block ciphers

2009
A block cipher typically operates on a plaintext which is broken into separate blocks of fixed length. The cipher maps an n bit plaintext to an n bit ciphertext, using a secret key of some fixed size; the mapping function must be invertible, so decryption is accomplished by simply applying the inverse map to the ciphertext.
Pantelimon Stanica, Thomas W. Cusick
openaire   +3 more sources

Protocols of cipher suite

2016 Electric Electronics, Computer Science, Biomedical Engineerings' Meeting (EBBT), 2016
The value of software is proportional to the value of quality. Quality is one of the elements of security. There are two basic concepts that basically contains the security elements it contains. When tested in terms of security software are basically just white-box testing can be used to test the internal structure and may only be used in the user's ...
YEŞİLTEPE, Mirsat   +2 more
openaire   +3 more sources

THE CYLINDER-CIPHER

Cryptologia, 1995
Questions Thomas Jefferson's attributed invention of the “cylinder cipher,” notes similar devices before and after his time, and introduces a “mystery device” of this nature in the National Cryptologic Museum, Fort George G. Meade MD.
openaire   +2 more sources

Introduction – A Revolutionary Cipher

2013
Cryptology is the science of secret writing. It is made up of two halves; cryptography consists of the techniques for creating systems of secret writing and cryptanalysis encompasses the techniques of breaking them. Over the past 2,500 years, cryptology has developed numerous types of systems to hide messages and subsequently a rich vocabulary in which
openaire   +2 more sources

Codes, not ciphers

The Mathematical Gazette, 2010
This article is written as a companion piece to the recent account of cryptography in [1]. The aim will be similar—to explain the meaning and principles of coding, give some implementations that are feasible at school and early undergraduate level, and give a flavour of the types of mathematics involved.2.
openaire   +2 more sources

The Cipher and Empire

2017
It is September 2009 and the start of a new semester. Students have gathered for the first meeting of my New Politics, New Possibilities class at Cornish College of the Arts in Seattle, Washington. We are seated around a table and are going through the syllabus.
openaire   +2 more sources

CORRESPONDENCE IN CIPHER A CIPHER TYPEWRITER TRADE CATALOGUE

Cryptologia, 1991
A description, from a trade catalog, of an early typewriter designed for use as a cryptographic machine, and the need for such a device, followed by excerpts from its patent.
openaire   +2 more sources

Books on ciphers [PDF]

open access: possibleNotes and Queries, 1939
openaire   +1 more source

Home - About - Disclaimer - Privacy