「cipher」の共起表現一覧(1語右で並び替え)
該当件数 : 126件
| His | cipher, a griffin in a crown, can still be seen on th |
| KeeLoq | cipher accepts 64-bit keys and encrypts 32-bit blocks |
| The application uses a 64-bit block | cipher algorithm for encryption and a proprietary com |
| The message is encrypted with some block | cipher algorithm in CBC mode to create a chain of blo |
| ard algorithm (AES - derived from the Rijndael | cipher algorithm) is a block cipher that processes 16 |
| Block | cipher algorithms encrypt blocks of bytes of plaintex |
| The 2009 challenge ended with a Jefferson Disk | cipher, and the most recent challenge ended with the |
| PMAC is a method of taking a block | cipher and creating an efficient message authenticati |
| where E is the encryption function ( | cipher), and K1 and K2 are the two keys. |
| The correspondence was in | cipher and full of circumlocutions but was interprete |
| mpossible to decipher them without knowing the | cipher and key used in the communications. |
| (Voiceprint) - 1999 - ( | Cipher and No-Man tracks) |
| r forms on GL(n), to Cryptography (Arithmetica | cipher, Anshel-Anshel-Goldfeld key exchange, etc.) et |
| When used in a stream | cipher as a combining function for linear feedback sh |
| yal Regiment (Norfolk Yeomanry) with the Royal | cipher as their badge. |
| See: stream | cipher attack |
| tack by IP packet substitution (such as stream | cipher attack). |
| ubstitution cryptogram known as the Trithemius | cipher, attributed to Johannes Trithemius, a medieval |
| A wheel | cipher being used to encode the phrase "ATTACK AT DAW |
| ve each station sending a continuous stream of | cipher bits, with null characters (e.g. |
| In cryptography, a | Cipher Block Chaining Message Authentication Code, ab |
| something the staff did with only pencils and | cipher books. |
| ski-sheet apparatus takes its name from Polish | Cipher Bureau mathematician-cryptologist Henryk Zygal |
| ak of World War II, the Polish General Staff's | Cipher Bureau disclosed to their French and British a |
| was a cryptologic technique used by the Polish | Cipher Bureau before and during World War II, and dur |
| The Polish | Cipher Bureau had likewise exploited "cribs" in the " |
| aty Woods south of Warsaw, at which the Polish | Cipher Bureau initiated the French and British into t |
| ablishing the joint State and War Department's | Cipher Bureau, the American Black Chamber. |
| produced cryptologic equipment designed by the | Cipher Bureau. |
| S-4) of the Polish General Staff's interbellum | Cipher Bureau. |
| an attack on an attempted expansion of a block | cipher by Diffie and Hellman in 1977. |
| igoni's own words, "I signed my work using the | cipher C followed by three crosses representing the v |
| Given a secure block | cipher, CBC-MAC is secure for fixed-length messages. |
| The National | Cipher Challenge is an annual cryptographic competiti |
| best known for having recruited Tyler Kent, a | cipher clerk at the U.S. Embassy in London, into Germ |
| Grant, Klebb sets a trap for Bond, enlisting a | cipher clerk, Tatiana Romanova, to pretend to defect, |
| ed additional training as a radio operator and | cipher clerk. |
| erman recover the dispatch case containing the | cipher codes and drive away. |
| ern of the courier chief to deliver top-secret | cipher codes - but when his behaviour becomes suspici |
| Carrying top-secret | cipher codes, he does not realise that two criminals, |
| to prove his identity by revealing top-secret | cipher codes. |
| Cipher Complex (canceled by Sega) (PlayStation 3, Xbo | |
| nown as Nyberg S-boxes), provably secure block | cipher design (resulting in KN-Cipher), and the crypt |
| to the national importance of his work at the | cipher desk, he was excluded from military service un |
| The four root VEST | cipher families are referred to as VEST-4, VEST-8, VE |
| ts family keying to generate other independent | cipher families of the same size. |
| eying process is a standard method to generate | cipher families with unique substitutions and unique |
| but 6 hours upon the dial plate, with 6 small | cipher figures within every hour; the hand going roun |
| ables the end-user to generate a unique secure | cipher for every chip. |
| The album's title is a simple substitution | cipher for the word "evil"; where each letter is repr |
| nd has also been proposed as a possible stream | cipher for use in cryptography. |
| he Jacobites, with Bethlehem a common Jacobite | cipher for England and Regem Angelorum a pun on Angel |
| Pepys's 'Diary,' and to this end he learnt the | cipher from Thomas Shelton's Tachygraphy. |
| The | cipher has influenced several other designs, for exam |
| techniques have been used to attack the stream | cipher Helix. |
| rvey, Noringo, Rich Varevice, Matt Gauss Band, | Cipher, How It Ends, Nook the Crook, Forever I Burn, |
| Cipher in the Snow is a short story written by Jean M | |
| Cipher in the Snow, written by Jean Mizer, an Idaho t | |
| r of Lord Bute, although he had largely been a | cipher in that position to the stronger personalities |
| For the character Cliff Evans, see | Cipher in the Snow. |
| SAFER ( | cipher), in cryptography, a family of block ciphers |
| Then, the | cipher is reinitialized to encrypt the rest of the TC |
| The Templar | cipher is an encoding method which has been claimed t |
| umption that because the method is secret, the | cipher is secure. |
| over what keys are used, such as when a block | cipher is used in a mode of operation intended to con |
| The | cipher is not subject to any patents. |
| hip, as a precaution most of the codebooks and | cipher keys were destroyed; some were retained, howev |
| In any case where a stream | cipher like RC4 is used twice with the same key it is |
| The T52 was one such stream | cipher machine that had weak key problems. |
| ly Knox had just reconstructed the main Enigma | cipher machine used by the Abwehr, German military in |
| terials, but the U-boat sank before the Enigma | cipher machine could be brought out. |
| of all its equipment, including U-110′s Enigma | cipher machine, code settings for high-security traff |
| worked on decrypting messages from the Enigma | cipher machine. |
| tive contributions to the design of the SIGABA | cipher machine. |
| eciphratoria, an ancestor of the famous Enigma | cipher machine. |
| e-breaking operation against the German Enigma | cipher machine. |
| ental non-Morse transmissions from teleprinter | cipher machines were being received in greater number |
| The first stream | cipher machines, that were also rotor machines had so |
| plied to impact printers and electromechanical | cipher machines. |
| he moved to Hut 7 to work on a Japanese naval | cipher, making a significant contribution in identify |
| If their otherwise random attacks on the | cipher managed to sometimes produce those words or (p |
| ory formulated by Bruce Wilson argues that the | Cipher Manuscripts had been received by Kenneth Macke |
| Using the | Cipher Manuscripts, Mackenzie allegedly founded "The |
| ng George VI told him the capture of the U-110 | cipher material had been "the most important single e |
| A cryptographic hash function or a block | cipher may be repeatedly applied in a loop (see pseud |
| These 512-byte sectors alone can use any block | cipher mode of operation (typically CBC), but since a |
| Hirose also provides a proof in the Ideal | Cipher Model. |
| e authentication code constructed from a block | cipher much like the PMAC algorithm. |
| the Tiny Encryption Algorithm (TEA) is a block | cipher notable for its simplicity of description and |
| Secret | Cipher of the UFOnauts: Reviewed by Dean James in Jou |
| British cryptanalysts have cracked the "shark" | cipher once before, and they need to do it again in o |
| When trying to improve the security of a block | cipher, one might get the idea to simply use two inde |
| ptanalysis that exploits unevenness in how the | cipher operates over equivalence classes (congruence |
| GCM requires one block | cipher operation and one 128-bit multiplication in th |
| ing Lars Knudsen's Square attack to Twofish, a | cipher outside the Square family, thus generalising t |
| hashing, parallelizable tree hashing, a stream | cipher, personalization, and a key derivation functio |
| , IDEA, Serpent, Camellia, and even the stream | cipher Phelix. |
| The four song recording was the first time | Cipher put together a compilation of work written for |
| iculty in the use of linkage analysis alone to | cipher risk. |
| Cipher runes, or cryptic runes, are the cryptographic | |
| ht to left and by interpreting some of them as | cipher runes, he believed he discerned a poem. |
| wofish, Camellia, CRYPTON, and even the stream | cipher Salsa20. |
| In 1919 he joined the Government Code and | Cipher School, working for four years on American dip |
| For the | cipher, see BassOmatic . |
| EA and 31 out of 32 rounds of the NSA-designed | cipher Skipjack. |
| r example, a distinguishing attack on a stream | cipher such as RC4 might be one that determines wheth |
| Wadsworth's | cipher system involved a set of two disks, one inside |
| RC4 is an example of a Vernam | cipher that is widely used on the Internet. |
| Any | cipher that can prevent chosen-plaintext attacks is t |
| he later stages of the competition, the ADFGVX | cipher, the Solitaire cipher, the Double Playfair cip |
| BI the information that it needed to crack the | cipher, uncover the identity of his two main contacts |
| authored attacks on AES, LEVIATHAN, and the E0 | cipher used in Bluetooth devices, as well as publishi |
| he output hash depends on the underlying block | cipher used. |
| The stream | cipher uses a 256-bit key and the performance of the |
| vid Lynch's Mulholland Drive, a gleaming dream | cipher waiting to be filled with an audience's fantas |
| cking Microsoft's Xbox game console, where the | cipher was used as a hash function. |
| s of distinguishing attack on a popular stream | cipher was by Itsik Mantin and Adi Shamir who showed |
| Because of these weaknesses, the XTEA | cipher was designed. |
| 1998 Development of Twofish block | cipher, which was a finalist for NIST's Advanced Encr |
| es, in 1998-1999 he designed the Hasty Pudding | Cipher which was a candidate for the Advanced Encrypt |
| t English royal claimant; in reality, he was a | cipher whose legitimacy was questioned. |
| A | cipher whose key space is too small is subject to bru |
| MDC-2 is a hash function based on a block | cipher with a proof of security in the ideal-cipher m |
| tracks differences that propagate through the | cipher with greater than expected probability, imposs |
| a differential characteristic over part of the | cipher with a probability of 1 (for a few rounds-this |
| ackman founding director of Freestyle Union, a | cipher workshop which uses a free styling as a tool t |
こんにちは ゲスト さん
|
ログイン |
Weblio会員(無料)になると
|
こんにちは ゲスト さん
|
ログイン |
Weblio会員(無料)になると
|