Search results

Jump to navigation Jump to search

Page title matches

  • ...horisation). The field has a long and interesting history, see History of cryptology. Cryptology provides the scientific background for a broad range of activities in signa
    848 bytes (113 words) - 16:46, 25 March 2024
  • 145 bytes (19 words) - 11:46, 4 August 2008
  • == Government cryptology ==
    1 KB (173 words) - 14:49, 4 April 2024
  • Cryptology (the science of secrets, from Greek) is the general term that encompasses b ...s Gannon, ''Stealing Secrets, Telling Lies: How [[Espionage|Spies]] and [[Cryptology|Codebreakers]] Helped Shape the Twentieth Century'', Washington, D.C., Bras
    9 KB (1,312 words) - 05:49, 8 April 2024
  • 137 bytes (18 words) - 04:42, 19 October 2010
  • 124 bytes (13 words) - 05:07, 19 October 2010

Page text matches

  • ...horisation). The field has a long and interesting history, see History of cryptology. Cryptology provides the scientific background for a broad range of activities in signa
    848 bytes (113 words) - 16:46, 25 March 2024
  • #REDIRECT [[History of cryptology]]
    35 bytes (4 words) - 04:24, 19 October 2010
  • In cryptology: {{r|Serpent (cipher)||}}
    53 bytes (6 words) - 18:32, 30 September 2009
  • The sub-field of cryptology which deals with breaking into existing codes and ciphers.
    122 bytes (16 words) - 11:08, 24 October 2008
  • Names used for certain pairs of players in game theory and cryptology; see [[Alice and Bob]].
    93 bytes (16 words) - 19:39, 29 April 2012
  • == Government cryptology ==
    1 KB (173 words) - 14:49, 4 April 2024
  • {{r|Rotor machine (cryptology)}}
    297 bytes (41 words) - 16:47, 30 October 2008
  • {{r|Square (cipher)|In cryptology}}
    384 bytes (49 words) - 16:43, 22 January 2010
  • ...ments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governa
    1 KB (217 words) - 18:31, 13 March 2024
  • ...rd E. Tavares]] | title = On the design of S-boxes | journal = Advances in Cryptology - Crypto '85 (Lecture Notes in Computer Science) | date = 1985 }} </ref>. T
    1 KB (209 words) - 21:41, 26 November 2010
  • ...I ''think'' I've added myself as a member, and [[information assurance]], cryptology, and [[classified information]] as articles. What, if anything, am I doing
    3 KB (428 words) - 14:37, 18 March 2024
  • * ''Stealing Secrets, Telling Lies: How [[Espionage|Spies]] and [[Cryptology|Codebreakers]] Helped Shape the [[Twentieth Century]]'', by [[James Gannon]
    3 KB (478 words) - 21:53, 10 May 2011
  • Cryptology (the science of secrets, from Greek) is the general term that encompasses b ...s Gannon, ''Stealing Secrets, Telling Lies: How [[Espionage|Spies]] and [[Cryptology|Codebreakers]] Helped Shape the Twentieth Century'', Washington, D.C., Bras
    9 KB (1,312 words) - 05:49, 8 April 2024
  • ...=Differential cryptanalysis of DES-like cryptosystems|publisher=Journal of Cryptology|date=1991}}</ref>. It was then clear that NSA had known the differential te | journal = Advances in Cryptology - Crypto '96
    16 KB (2,456 words) - 05:48, 8 April 2024
  • ...ia, regardless of other shortages, a great innovator in communications and cryptology. ...am Sinkov]]. Kahn's memorable comment "If Yardley was the star of American cryptology, Friedman was the Sun" remains apt. They developed largely manual cylindric
    16 KB (2,460 words) - 06:04, 8 April 2024
  • | title = Cryptology
    8 KB (1,338 words) - 05:49, 8 April 2024
  • ...polyalphabetic substitution emerged in the Renaissance".<ref>David Kahn, "Cryptology Goes Public", 58 ''Foreign Affairs'' 141, 151 (fall 1979), p. 153.</ref>
    8 KB (1,233 words) - 05:48, 8 April 2024
  • *{{pl|Cryptology}}
    9 KB (1,159 words) - 17:35, 14 March 2024
  • ...rd E. Tavares]] | title = On the design of S-boxes | journal = Advances in Cryptology - Crypto '85 (Lecture Notes in Computer Science) | date = 1985 }} </ref>; n
    9 KB (1,452 words) - 05:49, 8 April 2024
  • ...=Differential cryptanalysis of DES-like cryptosystems|publisher=Journal of Cryptology|date=1991}}</ref> on [[differential cryptanalysis]], the differential attac
    11 KB (1,819 words) - 05:48, 8 April 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)