「cipher」の共起表現一覧(1語右で並び替え)
該当件数 : 126件
His | cipher, a griffin in a crown, can still be seen on th |
KeeLoq | cipher accepts 64-bit keys and encrypts 32-bit blocks |
The application uses a 64-bit block | cipher algorithm for encryption and a proprietary com |
The message is encrypted with some block | cipher algorithm in CBC mode to create a chain of blo |
ard algorithm (AES - derived from the Rijndael | cipher algorithm) is a block cipher that processes 16 |
Block | cipher algorithms encrypt blocks of bytes of plaintex |
The 2009 challenge ended with a Jefferson Disk | cipher, and the most recent challenge ended with the |
PMAC is a method of taking a block | cipher and creating an efficient message authenticati |
where E is the encryption function ( | cipher), and K1 and K2 are the two keys. |
The correspondence was in | cipher and full of circumlocutions but was interprete |
mpossible to decipher them without knowing the | cipher and key used in the communications. |
(Voiceprint) - 1999 - ( | Cipher and No-Man tracks) |
r forms on GL(n), to Cryptography (Arithmetica | cipher, Anshel-Anshel-Goldfeld key exchange, etc.) et |
When used in a stream | cipher as a combining function for linear feedback sh |
yal Regiment (Norfolk Yeomanry) with the Royal | cipher as their badge. |
See: stream | cipher attack |
tack by IP packet substitution (such as stream | cipher attack). |
ubstitution cryptogram known as the Trithemius | cipher, attributed to Johannes Trithemius, a medieval |
A wheel | cipher being used to encode the phrase "ATTACK AT DAW |
ve each station sending a continuous stream of | cipher bits, with null characters (e.g. |
In cryptography, a | Cipher Block Chaining Message Authentication Code, ab |
something the staff did with only pencils and | cipher books. |
ski-sheet apparatus takes its name from Polish | Cipher Bureau mathematician-cryptologist Henryk Zygal |
ak of World War II, the Polish General Staff's | Cipher Bureau disclosed to their French and British a |
was a cryptologic technique used by the Polish | Cipher Bureau before and during World War II, and dur |
The Polish | Cipher Bureau had likewise exploited "cribs" in the " |
aty Woods south of Warsaw, at which the Polish | Cipher Bureau initiated the French and British into t |
ablishing the joint State and War Department's | Cipher Bureau, the American Black Chamber. |
produced cryptologic equipment designed by the | Cipher Bureau. |
S-4) of the Polish General Staff's interbellum | Cipher Bureau. |
an attack on an attempted expansion of a block | cipher by Diffie and Hellman in 1977. |
igoni's own words, "I signed my work using the | cipher C followed by three crosses representing the v |
Given a secure block | cipher, CBC-MAC is secure for fixed-length messages. |
The National | Cipher Challenge is an annual cryptographic competiti |
best known for having recruited Tyler Kent, a | cipher clerk at the U.S. Embassy in London, into Germ |
Grant, Klebb sets a trap for Bond, enlisting a | cipher clerk, Tatiana Romanova, to pretend to defect, |
ed additional training as a radio operator and | cipher clerk. |
erman recover the dispatch case containing the | cipher codes and drive away. |
ern of the courier chief to deliver top-secret | cipher codes - but when his behaviour becomes suspici |
Carrying top-secret | cipher codes, he does not realise that two criminals, |
to prove his identity by revealing top-secret | cipher codes. |
Cipher Complex (canceled by Sega) (PlayStation 3, Xbo | |
nown as Nyberg S-boxes), provably secure block | cipher design (resulting in KN-Cipher), and the crypt |
to the national importance of his work at the | cipher desk, he was excluded from military service un |
The four root VEST | cipher families are referred to as VEST-4, VEST-8, VE |
ts family keying to generate other independent | cipher families of the same size. |
eying process is a standard method to generate | cipher families with unique substitutions and unique |
but 6 hours upon the dial plate, with 6 small | cipher figures within every hour; the hand going roun |
ables the end-user to generate a unique secure | cipher for every chip. |
The album's title is a simple substitution | cipher for the word "evil"; where each letter is repr |
nd has also been proposed as a possible stream | cipher for use in cryptography. |
he Jacobites, with Bethlehem a common Jacobite | cipher for England and Regem Angelorum a pun on Angel |
Pepys's 'Diary,' and to this end he learnt the | cipher from Thomas Shelton's Tachygraphy. |
The | cipher has influenced several other designs, for exam |
techniques have been used to attack the stream | cipher Helix. |
rvey, Noringo, Rich Varevice, Matt Gauss Band, | Cipher, How It Ends, Nook the Crook, Forever I Burn, |
Cipher in the Snow is a short story written by Jean M | |
Cipher in the Snow, written by Jean Mizer, an Idaho t | |
r of Lord Bute, although he had largely been a | cipher in that position to the stronger personalities |
For the character Cliff Evans, see | Cipher in the Snow. |
SAFER ( | cipher), in cryptography, a family of block ciphers |
Then, the | cipher is reinitialized to encrypt the rest of the TC |
The Templar | cipher is an encoding method which has been claimed t |
umption that because the method is secret, the | cipher is secure. |
over what keys are used, such as when a block | cipher is used in a mode of operation intended to con |
The | cipher is not subject to any patents. |
hip, as a precaution most of the codebooks and | cipher keys were destroyed; some were retained, howev |
In any case where a stream | cipher like RC4 is used twice with the same key it is |
The T52 was one such stream | cipher machine that had weak key problems. |
ly Knox had just reconstructed the main Enigma | cipher machine used by the Abwehr, German military in |
terials, but the U-boat sank before the Enigma | cipher machine could be brought out. |
of all its equipment, including U-110′s Enigma | cipher machine, code settings for high-security traff |
worked on decrypting messages from the Enigma | cipher machine. |
tive contributions to the design of the SIGABA | cipher machine. |
eciphratoria, an ancestor of the famous Enigma | cipher machine. |
e-breaking operation against the German Enigma | cipher machine. |
ental non-Morse transmissions from teleprinter | cipher machines were being received in greater number |
The first stream | cipher machines, that were also rotor machines had so |
plied to impact printers and electromechanical | cipher machines. |
he moved to Hut 7 to work on a Japanese naval | cipher, making a significant contribution in identify |
If their otherwise random attacks on the | cipher managed to sometimes produce those words or (p |
ory formulated by Bruce Wilson argues that the | Cipher Manuscripts had been received by Kenneth Macke |
Using the | Cipher Manuscripts, Mackenzie allegedly founded "The |
ng George VI told him the capture of the U-110 | cipher material had been "the most important single e |
A cryptographic hash function or a block | cipher may be repeatedly applied in a loop (see pseud |
These 512-byte sectors alone can use any block | cipher mode of operation (typically CBC), but since a |
Hirose also provides a proof in the Ideal | Cipher Model. |
e authentication code constructed from a block | cipher much like the PMAC algorithm. |
the Tiny Encryption Algorithm (TEA) is a block | cipher notable for its simplicity of description and |
Secret | Cipher of the UFOnauts: Reviewed by Dean James in Jou |
British cryptanalysts have cracked the "shark" | cipher once before, and they need to do it again in o |
When trying to improve the security of a block | cipher, one might get the idea to simply use two inde |
ptanalysis that exploits unevenness in how the | cipher operates over equivalence classes (congruence |
GCM requires one block | cipher operation and one 128-bit multiplication in th |
ing Lars Knudsen's Square attack to Twofish, a | cipher outside the Square family, thus generalising t |
hashing, parallelizable tree hashing, a stream | cipher, personalization, and a key derivation functio |
, IDEA, Serpent, Camellia, and even the stream | cipher Phelix. |
The four song recording was the first time | Cipher put together a compilation of work written for |
iculty in the use of linkage analysis alone to | cipher risk. |
Cipher runes, or cryptic runes, are the cryptographic | |
ht to left and by interpreting some of them as | cipher runes, he believed he discerned a poem. |
wofish, Camellia, CRYPTON, and even the stream | cipher Salsa20. |
In 1919 he joined the Government Code and | Cipher School, working for four years on American dip |
For the | cipher, see BassOmatic . |
EA and 31 out of 32 rounds of the NSA-designed | cipher Skipjack. |
r example, a distinguishing attack on a stream | cipher such as RC4 might be one that determines wheth |
Wadsworth's | cipher system involved a set of two disks, one inside |
RC4 is an example of a Vernam | cipher that is widely used on the Internet. |
Any | cipher that can prevent chosen-plaintext attacks is t |
he later stages of the competition, the ADFGVX | cipher, the Solitaire cipher, the Double Playfair cip |
BI the information that it needed to crack the | cipher, uncover the identity of his two main contacts |
authored attacks on AES, LEVIATHAN, and the E0 | cipher used in Bluetooth devices, as well as publishi |
he output hash depends on the underlying block | cipher used. |
The stream | cipher uses a 256-bit key and the performance of the |
vid Lynch's Mulholland Drive, a gleaming dream | cipher waiting to be filled with an audience's fantas |
cking Microsoft's Xbox game console, where the | cipher was used as a hash function. |
s of distinguishing attack on a popular stream | cipher was by Itsik Mantin and Adi Shamir who showed |
Because of these weaknesses, the XTEA | cipher was designed. |
1998 Development of Twofish block | cipher, which was a finalist for NIST's Advanced Encr |
es, in 1998-1999 he designed the Hasty Pudding | Cipher which was a candidate for the Advanced Encrypt |
t English royal claimant; in reality, he was a | cipher whose legitimacy was questioned. |
A | cipher whose key space is too small is subject to bru |
MDC-2 is a hash function based on a block | cipher with a proof of security in the ideal-cipher m |
tracks differences that propagate through the | cipher with greater than expected probability, imposs |
a differential characteristic over part of the | cipher with a probability of 1 (for a few rounds-this |
ackman founding director of Freestyle Union, a | cipher workshop which uses a free styling as a tool t |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |