Search results
Jump to navigation
Jump to search
Page title matches
- ...bersome [[codebook]]s, so ciphers are now the dominant technique in modern cryptography. Various tricks can be used to "[[gardening (cryptography)|plant]]" or "sow" information into a coded message, for example by executi ...16 KB (2,506 words) - 17:19, 22 September 2024
Page text matches
- #REDIRECT [[Code (cryptography)#Idiot code]] ...44 bytes (5 words) - 10:35, 1 February 2008
- #REDIRECT [[Code (cryptography)]] ...33 bytes (3 words) - 00:39, 18 July 2004
- ...alled '''Keyword,''' was a doubly [[Cipher|enciphered]] diplomatic [[Code (cryptography)|code]] used by the Germans during the [[Second World War]]. The Allies us [[Category:Cryptography]] ...969 bytes (129 words) - 00:29, 22 March 2024
- In [[cryptography]], '''Frogbit''' is a [[stream cipher|stream cypher]] [[algorithm]] develop {{Cryptography navbox | stream}} ...480 bytes (65 words) - 23:57, 18 July 2023
- ...re''' ('''JCA''') is a [[Software framework|framework]] for working with [[cryptography]] using the [[Java (programming language)|Java programming language]]. It f *[[Java Cryptography Extension]] ...2 KB (203 words) - 17:08, 30 December 2023
- ..., he is the overall coordinator of [[Secure Communication based on Quantum Cryptography]].<ref>{{cite web|url=http://www.computerweekly.com/Articles/2004/05/18/202 ...876 bytes (108 words) - 03:17, 2 December 2023
- * [[Residual block termination]], in cryptography ...526 bytes (61 words) - 16:23, 6 April 2025
- * [[JH (hash function)]], in cryptography ...524 bytes (66 words) - 18:39, 1 April 2024
- ...tml |title=Decoder Ring — How a ragged band broke the government's hold on cryptography |work=The New York Times |date=January 14, 2001}}</ref> * [[Books on cryptography]] ...2 KB (279 words) - 02:12, 4 January 2025
- [[Category:Cryptography]] ...993 bytes (120 words) - 09:07, 28 April 2025
- ==Telecommunications, computing, cryptography== ...2 KB (239 words) - 09:49, 23 May 2025
- '''''The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography''''' is a book by [[Simon Singh]], published in 1999 by [[Fourth Estate (im ...e|Polish]], tend to do the opposite and refer to both principal types of [[cryptography]] as "cipher", as in "''[[Biuro Szyfrów]]''" ("Cipher Bureau").</ref> ...4 KB (605 words) - 04:38, 5 May 2025
- * ''[[The Codebreakers]]'', a 1967 book on history of cryptography by David Kahn ...1 KB (152 words) - 22:57, 27 August 2022
- ==Classical [[cryptography]]== ...2 KB (164 words) - 16:43, 14 March 2025
- A '''codebook''' is a type of document used for gathering and storing [[cryptography code]]s. Originally, codebooks were often literally [[books|<span lang="en- ==Cryptography== ...4 KB (671 words) - 03:22, 20 March 2025
- ...yptographic Message Syntax''' ('''CMS''') is the [[IETF]]'s standard for [[Cryptography|cryptographically]] protected messages. It can be used by cryptographic sch * {{IETF RFC|5753}} (Using Elliptic Curve Cryptography with CMS, in use) ...3 KB (349 words) - 07:10, 20 February 2025
- *[[Quantum Resistant Ledger]], a blockchain solution utilizing Post-Quantum Cryptography (PQC) ...575 bytes (86 words) - 00:22, 19 April 2024
- SOBER-128 takes a [[key (cryptography)|key]] up to 128 bits in length.<ref>{{Cite web |last1=Hawkes |first1=Phili {{Cryptography navbox | stream}} ...2 KB (206 words) - 21:37, 26 September 2023
- ...om number generation]], [[electronic voting]], [[side-channel attack]]s on cryptography implementations, and anonymizing communications systems. He previously wor ...1 KB (142 words) - 06:23, 23 June 2025
- *[[Special Liaison Unit]], delivering WWII [[Ultra (cryptography)|Ultra]] intelligence ...861 bytes (103 words) - 05:15, 15 May 2025