「cryptography」の共起表現(1語右で並び替え) - Weblio英語共起表現検索


小窓モード

プレミアム

ログイン
設定

設定

Weblio 辞書 > 英和辞典・和英辞典 > cryptographyの意味・解説 > cryptographyに関連した共起表現

「cryptography」の共起表現一覧(1語右で並び替え)

該当件数 : 102



In cryptography, a watermarking attack is an attack on disk
In cryptography, a DMA attack is a type of side channel att
In cryptography, a subgroup confinement attack (or small su
In cryptography, a key signing party is an event at which p
In cryptography, a random oracle is an oracle (a theoretica
SAFER (cipher), in cryptography, a family of block ciphers
In cryptography, a distinguishing attack is any form of cry
In cryptography, a Cipher Block Chaining Message Authentica
In cryptography, a timing attack is a side channel attack i
In cryptography, an interpolation attack is a type of crypt
onal science including spintronics, quantum cryptography and quantum computing.
sics - notably quantum nonlocality, quantum cryptography, and quantum teleportation.
piration of the basic patents on public key cryptography and the widespread use of laptop computers
al studies to use by developing a system of cryptography and a coding machine that came to be widely
ects such as the Semantic Web, World War II cryptography and computer programming) and the prize-giv
He offers courses on cryptography and coding theory.
The intersection of public-key cryptography and public policy or a political ideology (
as include computational complexity theory, cryptography and computational number theory.
ppears in combinatorics, complexity theory, cryptography and applied mathematics.
g solutions provider in the mobile banking, cryptography and banking technology space.
Other recurring subjects include cryptography and the effects of technically ill-consider
boundary between permitted ("low-strength") cryptography and impermissible ("high-strength") cryptog
rring decimals for error correction coding, cryptography and as random sequences.
ngineering in 2009 for his contributions to cryptography and Internet security.
RSA Security Conference, Cryptography and information security-related conference
ith Gilles Brassard, the concept of quantum cryptography and is one of the founding fathers of moder
ordinarily secure, relying upon private key cryptography and SSL to ensure confidentiality of users'
at the University of Passau, researching in cryptography and in computational commutative algebra.
uary 2, 1952) is a researcher in public key cryptography, and more recently a researcher and speaker
vision, personal privacy (personal rights), cryptography and many more).
philosophy, chess, animal rights, medicine, cryptography and film criticism.
This appears in the cryptography article: "In the mid-19th century Charles B
e from UC Berkeley and completed his PhD in cryptography at MIT, in the Theory of Computation group.
d that governs implementation of public-key cryptography based on the RSA algorithm.
In cryptography, black-bag cryptanalysis is a euphemism for
ude not only high-performance computing for cryptography, but also cryptography itself, network secu
In cryptography, CMAC (Cipher-based MAC) is a block cipher-
hat the British forces captured the Italian cryptography code, but this assertion is dismissed by th
will be discussed with how to teach / learn Cryptography, Coding Theory, Graph Theory, during 27-31
th work on computational complexity theory, cryptography, coding theory, and game theory.
statistical design, communications theory, cryptography, computer security, and a host of other pra
11, 1973) is an American cryptographer and cryptography consultant, currently the president and chi
frastructure protection, Internet security, cryptography, counter eavesdropping, certification of se
ie Neveu works for the French police in the cryptography department.
In cryptography, differential equations of addition (DEA) a
rimitives including: symmetric & asymmetric cryptography; digital signatures; hash functions; bit-co
lan Turing's research into codebreaking and cryptography during the Second World War at Bletchley Pa
In the history of cryptography, early ciphers, implemented using pen-and-p
sland, affiliation with cypherpunks, use of cryptography, etc.
e delivered the IACR Distinguished Lecture, Cryptography Everywhere.
st on episodes of "Binary Revolution", as a cryptography expert.
ides cryptographic support through the Java Cryptography Extension (JCE) with the Bouncy Castle Cryp
va Secure Socket Extension (JSSE), and Java Cryptography Extension (JCE).
order to ascertain integrity, eRT uses SSL cryptography for all legally binding content it serves.
third track was dedicated to "Security and Cryptography Foundations", and in 2009, it is devoted to
lished in 1949 by Claude Shannon discussing cryptography from the viewpoint of information theory.
Usually in cryptography hard means something like “almost certainly
In cryptography, impossible differential cryptanalysis is a
He has worked on cryptography, in particular the XSL attack.
tial deciphering, an interesting example of cryptography in the 16th century.
s in 1616, Chess or the King's game, and on cryptography in 1624: Cryptomenytices et Cryptographiae
In cryptography, integral cryptanalysis is a cryptanalytic
Mathematical cryptography is usually not the weakest link in a securi
The book on cryptography is largely based on earlier work by Trithem
In cryptography, key stretching refers to techniques used t
s well-known products include the RSA BSAFE cryptography libraries and the SecurID authentication to
agues tired of having to re-invent a set of cryptography libraries each time they changed jobs.
In cryptography, MDC-2 (Modification Detection Code 2, some
classified report A Mathematical Theory of Cryptography, Memorandum MM 45-110-02, Sept. 1, 1945, Be
In cryptography, mod n cryptanalysis is an attack applicabl
tics, physics, bioinformatics, nanobiology, cryptography, network security, communications engineeri
f Boolean functions play a critical role in cryptography, particularly in the design of symmetric ke
21 February 1962) is a Danish researcher in cryptography, particularly interested in the design and
Panama is a cryptography primitive which can be used both as a hash
they're capable of making their own strong cryptography programs without having to rely on professi
Kotelnikov was also involved in cryptography, proving the absolute security of the one-t
Deep Crack was designed by Cryptography Research, Inc., Advanced Wireless Technolog
ipal designer was Paul Kocher, president of Cryptography Research.
s and major tenants include SquareTrade and Cryptography Research.
Stefan Brands is an entrepreneur and former cryptography researcher whose work has focused on digita
In cryptography, rotational cryptanalysis is a generic cryp
Com systems combined with ECCM methods, and cryptography secure the communications.
In cryptography, sinople is a 128-bit symmetric block ciphe
ciphers are available alongside asymmetric cryptography such as RSA, elliptic curve cryptography, d
GPG message cryptography support
SSL and TLS transmission cryptography support
In cryptography, the padding oracle attack is an attack on
In cryptography, the boomerang attack is a method for the c
In cryptography, the Tiny Encryption Algorithm (TEA) is a b
In cryptography, the OpenPGP card is an ISO/IEC 7816-4, -8
In cryptography, Tiger is a cryptographic hash function des
curves; it was introduced in elliptic curve cryptography to speed up the addition and doubling formu
Usually, such communities employ public-key cryptography to ensure that their users can speak freely
a broad range of applications, ranging from cryptography to marine navigation.
se technologies such as SSL connections and cryptography to prevent packet sniffing, data inspection
ng a practical means of applying public key cryptography to secure network communications.
In cryptography, truncated differential cryptanalysis is a
Nearly all American military World War I cryptography was done at Fabyan's laboratories, where El
The Americans were relative newcomers to cryptography when they entered the war, but they did hav
lished a book of 600 exercises in classical cryptography, which was published in the United States a
Stunnel uses Public-key cryptography with X.509 digital certificates to secure t
More recently she has been working in cryptography: with her husband Andrew Yao and Wang Xiaoy
                                                                                                    


こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する
英→日 日→英
こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する

©2024 GRAS Group, Inc.RSS