小窓モード

プレミアム

ログイン
設定

設定

「cipher」の共起表現一覧(1語右で並び替え)

該当件数 : 126



His cipher, a griffin in a crown, can still be seen on th
KeeLoq cipher accepts 64-bit keys and encrypts 32-bit blocks
The application uses a 64-bit block cipher algorithm for encryption and a proprietary com
The message is encrypted with some block cipher algorithm in CBC mode to create a chain of blo
ard algorithm (AES - derived from the Rijndael cipher algorithm) is a block cipher that processes 16
Block cipher algorithms encrypt blocks of bytes of plaintex
The 2009 challenge ended with a Jefferson Disk cipher, and the most recent challenge ended with the
PMAC is a method of taking a block cipher and creating an efficient message authenticati
where E is the encryption function ( cipher), and K1 and K2 are the two keys.
The correspondence was in cipher and full of circumlocutions but was interprete
mpossible to decipher them without knowing the cipher and key used in the communications.
(Voiceprint) - 1999 - ( Cipher and No-Man tracks)
r forms on GL(n), to Cryptography (Arithmetica cipher, Anshel-Anshel-Goldfeld key exchange, etc.) et
When used in a stream cipher as a combining function for linear feedback sh
yal Regiment (Norfolk Yeomanry) with the Royal cipher as their badge.
See: stream cipher attack
tack by IP packet substitution (such as stream cipher attack).
ubstitution cryptogram known as the Trithemius cipher, attributed to Johannes Trithemius, a medieval
A wheel cipher being used to encode the phrase "ATTACK AT DAW
ve each station sending a continuous stream of cipher bits, with null characters (e.g.
In cryptography, a Cipher Block Chaining Message Authentication Code, ab
something the staff did with only pencils and cipher books.
ski-sheet apparatus takes its name from Polish Cipher Bureau mathematician-cryptologist Henryk Zygal
ak of World War II, the Polish General Staff's Cipher Bureau disclosed to their French and British a
was a cryptologic technique used by the Polish Cipher Bureau before and during World War II, and dur
The Polish Cipher Bureau had likewise exploited "cribs" in the "
aty Woods south of Warsaw, at which the Polish Cipher Bureau initiated the French and British into t
ablishing the joint State and War Department's Cipher Bureau, the American Black Chamber.
produced cryptologic equipment designed by the Cipher Bureau.
S-4) of the Polish General Staff's interbellum Cipher Bureau.
an attack on an attempted expansion of a block cipher by Diffie and Hellman in 1977.
igoni's own words, "I signed my work using the cipher C followed by three crosses representing the v
Given a secure block cipher, CBC-MAC is secure for fixed-length messages.
The National Cipher Challenge is an annual cryptographic competiti
best known for having recruited Tyler Kent, a cipher clerk at the U.S. Embassy in London, into Germ
Grant, Klebb sets a trap for Bond, enlisting a cipher clerk, Tatiana Romanova, to pretend to defect,
ed additional training as a radio operator and cipher clerk.
erman recover the dispatch case containing the cipher codes and drive away.
ern of the courier chief to deliver top-secret cipher codes - but when his behaviour becomes suspici
Carrying top-secret cipher codes, he does not realise that two criminals,
to prove his identity by revealing top-secret cipher codes.
Cipher Complex (canceled by Sega) (PlayStation 3, Xbo
nown as Nyberg S-boxes), provably secure block cipher design (resulting in KN-Cipher), and the crypt
to the national importance of his work at the cipher desk, he was excluded from military service un
The four root VEST cipher families are referred to as VEST-4, VEST-8, VE
ts family keying to generate other independent cipher families of the same size.
eying process is a standard method to generate cipher families with unique substitutions and unique
but 6 hours upon the dial plate, with 6 small cipher figures within every hour; the hand going roun
ables the end-user to generate a unique secure cipher for every chip.
The album's title is a simple substitution cipher for the word "evil"; where each letter is repr
nd has also been proposed as a possible stream cipher for use in cryptography.
he Jacobites, with Bethlehem a common Jacobite cipher for England and Regem Angelorum a pun on Angel
Pepys's 'Diary,' and to this end he learnt the cipher from Thomas Shelton's Tachygraphy.
The cipher has influenced several other designs, for exam
techniques have been used to attack the stream cipher Helix.
rvey, Noringo, Rich Varevice, Matt Gauss Band, Cipher, How It Ends, Nook the Crook, Forever I Burn,
Cipher in the Snow is a short story written by Jean M
Cipher in the Snow, written by Jean Mizer, an Idaho t
r of Lord Bute, although he had largely been a cipher in that position to the stronger personalities
For the character Cliff Evans, see Cipher in the Snow.
SAFER ( cipher), in cryptography, a family of block ciphers
Then, the cipher is reinitialized to encrypt the rest of the TC
The Templar cipher is an encoding method which has been claimed t
umption that because the method is secret, the cipher is secure.
over what keys are used, such as when a block cipher is used in a mode of operation intended to con
The cipher is not subject to any patents.
hip, as a precaution most of the codebooks and cipher keys were destroyed; some were retained, howev
In any case where a stream cipher like RC4 is used twice with the same key it is
The T52 was one such stream cipher machine that had weak key problems.
ly Knox had just reconstructed the main Enigma cipher machine used by the Abwehr, German military in
terials, but the U-boat sank before the Enigma cipher machine could be brought out.
of all its equipment, including U-110′s Enigma cipher machine, code settings for high-security traff
worked on decrypting messages from the Enigma cipher machine.
tive contributions to the design of the SIGABA cipher machine.
eciphratoria, an ancestor of the famous Enigma cipher machine.
e-breaking operation against the German Enigma cipher machine.
ental non-Morse transmissions from teleprinter cipher machines were being received in greater number
The first stream cipher machines, that were also rotor machines had so
plied to impact printers and electromechanical cipher machines.
he moved to Hut 7 to work on a Japanese naval cipher, making a significant contribution in identify
If their otherwise random attacks on the cipher managed to sometimes produce those words or (p
ory formulated by Bruce Wilson argues that the Cipher Manuscripts had been received by Kenneth Macke
Using the Cipher Manuscripts, Mackenzie allegedly founded "The
ng George VI told him the capture of the U-110 cipher material had been "the most important single e
A cryptographic hash function or a block cipher may be repeatedly applied in a loop (see pseud
These 512-byte sectors alone can use any block cipher mode of operation (typically CBC), but since a
Hirose also provides a proof in the Ideal Cipher Model.
e authentication code constructed from a block cipher much like the PMAC algorithm.
the Tiny Encryption Algorithm (TEA) is a block cipher notable for its simplicity of description and
Secret Cipher of the UFOnauts: Reviewed by Dean James in Jou
British cryptanalysts have cracked the "shark" cipher once before, and they need to do it again in o
When trying to improve the security of a block cipher, one might get the idea to simply use two inde
ptanalysis that exploits unevenness in how the cipher operates over equivalence classes (congruence
GCM requires one block cipher operation and one 128-bit multiplication in th
ing Lars Knudsen's Square attack to Twofish, a cipher outside the Square family, thus generalising t
hashing, parallelizable tree hashing, a stream cipher, personalization, and a key derivation functio
, IDEA, Serpent, Camellia, and even the stream cipher Phelix.
The four song recording was the first time Cipher put together a compilation of work written for
iculty in the use of linkage analysis alone to cipher risk.
Cipher runes, or cryptic runes, are the cryptographic
ht to left and by interpreting some of them as cipher runes, he believed he discerned a poem.
wofish, Camellia, CRYPTON, and even the stream cipher Salsa20.
In 1919 he joined the Government Code and Cipher School, working for four years on American dip
For the cipher, see BassOmatic .
EA and 31 out of 32 rounds of the NSA-designed cipher Skipjack.
r example, a distinguishing attack on a stream cipher such as RC4 might be one that determines wheth
Wadsworth's cipher system involved a set of two disks, one inside
RC4 is an example of a Vernam cipher that is widely used on the Internet.
Any cipher that can prevent chosen-plaintext attacks is t
he later stages of the competition, the ADFGVX cipher, the Solitaire cipher, the Double Playfair cip
BI the information that it needed to crack the cipher, uncover the identity of his two main contacts
authored attacks on AES, LEVIATHAN, and the E0 cipher used in Bluetooth devices, as well as publishi
he output hash depends on the underlying block cipher used.
The stream cipher uses a 256-bit key and the performance of the
vid Lynch's Mulholland Drive, a gleaming dream cipher waiting to be filled with an audience's fantas
cking Microsoft's Xbox game console, where the cipher was used as a hash function.
s of distinguishing attack on a popular stream cipher was by Itsik Mantin and Adi Shamir who showed
Because of these weaknesses, the XTEA cipher was designed.
1998 Development of Twofish block cipher, which was a finalist for NIST's Advanced Encr
es, in 1998-1999 he designed the Hasty Pudding Cipher which was a candidate for the Advanced Encrypt
t English royal claimant; in reality, he was a cipher whose legitimacy was questioned.
A cipher whose key space is too small is subject to bru
MDC-2 is a hash function based on a block cipher with a proof of security in the ideal-cipher m
tracks differences that propagate through the cipher with greater than expected probability, imposs
a differential characteristic over part of the cipher with a probability of 1 (for a few rounds-this
ackman founding director of Freestyle Union, a cipher workshop which uses a free styling as a tool t
                                                                                                    


こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する
英→日 日→英
こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する

©2024 GRAS Group, Inc.RSS