Cryptology

Results: 302



#Item
121

Sharing the Burden: Women in Cryptology during World War II Cover Photos: COLOSSUS

Add to Reading List

Source URL: www.nsa.gov

- Date: 2013-12-24 09:27:20
    122

    Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks Matt Blaze AT&T Labs – Research , 15 September 2002 – PREPRINT: This paper can be found at

    Add to Reading List

    Source URL: www.tux.org

    - Date: 2003-01-23 11:52:20
      123

      Buried Messages ~ 1 Cryptology A E

      Add to Reading List

      Source URL: www.cleavebooks.co.uk

      Language: English - Date: 2007-05-13 18:30:18
        124

        CRYPTOLOGY Display Materials Index to Slides

        Add to Reading List

        Source URL: www.cleavebooks.co.uk

        Language: English - Date: 2007-05-13 18:30:42
          125

          Coded Messages ~ 1 Cryptology Messages which are intended to be kept secret can be sent in code. This requires the sender and recipient to know the same code. Usually this is contained in a book. The one to be

          Add to Reading List

          Source URL: www.cleavebooks.co.uk

          Language: English - Date: 2007-05-13 18:30:19
            126

            CRYPTOLOGY Additional Materials Cryptology

            Add to Reading List

            Source URL: www.cleavebooks.co.uk

            Language: English - Date: 2007-05-13 18:30:37
              127

              Simple Cipher Messages ~ 1 Cryptology Ciphers are used to make the contents of a message secret, so that it cannot be read by anyone who for whom it is not intended. There many ways of doing this, varying from the extre

              Add to Reading List

              Source URL: www.cleavebooks.co.uk

              Language: English - Date: 2007-05-13 18:30:22
                128

                Addition Ciphers ~ 1 Cryptology Nowadays, most ciphers are based on numbers rather than letters. There are different reasons for this, but mainly it is done so that various arithmetic operations can be carried out on

                Add to Reading List

                Source URL: www.cleavebooks.co.uk

                Language: English - Date: 2007-05-13 18:30:24
                  129International Cryptology Conference

                  MINUTES IACR MEMBERSHIP MEETING CRYPTO’11 Opening. AtPreneel opens the meeting and gives a presentation about the IACR during which he thanks the ex-officers and the outgoing membership secretary Shai Halevi. [

                  Add to Reading List

                  Source URL: www.iacr.org

                  Language: English - Date: 2012-04-16 10:11:47
                    130International Cryptology Conference / Kevin McCurley / Cryptography / Year of birth missing / Reihaneh Safavi-Naini

                    MINUTES IACR MEMBERSHIP MEETING CRYPTO’12 UCSB, 22 AUGUST 2012 Opening. AtPreneel opens the meeting. He begins by giving an overview of the IACR and its activities. Treasurer’s Report. Rose presents the curren

                    Add to Reading List

                    Source URL: www.iacr.org

                    Language: English - Date: 2013-08-16 17:22:10
                    UPDATE