「cryptography」の共起表現一覧(1語右で並び替え)
該当件数 : 102件
In | cryptography, a watermarking attack is an attack on disk |
In | cryptography, a DMA attack is a type of side channel att |
In | cryptography, a subgroup confinement attack (or small su |
In | cryptography, a key signing party is an event at which p |
In | cryptography, a random oracle is an oracle (a theoretica |
SAFER (cipher), in | cryptography, a family of block ciphers |
In | cryptography, a distinguishing attack is any form of cry |
In | cryptography, a Cipher Block Chaining Message Authentica |
In | cryptography, a timing attack is a side channel attack i |
In | cryptography, an interpolation attack is a type of crypt |
onal science including spintronics, quantum | cryptography and quantum computing. |
sics - notably quantum nonlocality, quantum | cryptography, and quantum teleportation. |
piration of the basic patents on public key | cryptography and the widespread use of laptop computers |
al studies to use by developing a system of | cryptography and a coding machine that came to be widely |
ects such as the Semantic Web, World War II | cryptography and computer programming) and the prize-giv |
He offers courses on | cryptography and coding theory. |
The intersection of public-key | cryptography and public policy or a political ideology ( |
as include computational complexity theory, | cryptography and computational number theory. |
ppears in combinatorics, complexity theory, | cryptography and applied mathematics. |
g solutions provider in the mobile banking, | cryptography and banking technology space. |
Other recurring subjects include | cryptography and the effects of technically ill-consider |
boundary between permitted ("low-strength") | cryptography and impermissible ("high-strength") cryptog |
rring decimals for error correction coding, | cryptography and as random sequences. |
ngineering in 2009 for his contributions to | cryptography and Internet security. |
RSA Security Conference, | Cryptography and information security-related conference |
ith Gilles Brassard, the concept of quantum | cryptography and is one of the founding fathers of moder |
ordinarily secure, relying upon private key | cryptography and SSL to ensure confidentiality of users' |
at the University of Passau, researching in | cryptography and in computational commutative algebra. |
uary 2, 1952) is a researcher in public key | cryptography, and more recently a researcher and speaker |
vision, personal privacy (personal rights), | cryptography and many more). |
philosophy, chess, animal rights, medicine, | cryptography and film criticism. |
This appears in the | cryptography article: "In the mid-19th century Charles B |
e from UC Berkeley and completed his PhD in | cryptography at MIT, in the Theory of Computation group. |
d that governs implementation of public-key | cryptography based on the RSA algorithm. |
In | cryptography, black-bag cryptanalysis is a euphemism for |
ude not only high-performance computing for | cryptography, but also cryptography itself, network secu |
In | cryptography, CMAC (Cipher-based MAC) is a block cipher- |
hat the British forces captured the Italian | cryptography code, but this assertion is dismissed by th |
will be discussed with how to teach / learn | Cryptography, Coding Theory, Graph Theory, during 27-31 |
th work on computational complexity theory, | cryptography, coding theory, and game theory. |
statistical design, communications theory, | cryptography, computer security, and a host of other pra |
11, 1973) is an American cryptographer and | cryptography consultant, currently the president and chi |
frastructure protection, Internet security, | cryptography, counter eavesdropping, certification of se |
ie Neveu works for the French police in the | cryptography department. |
In | cryptography, differential equations of addition (DEA) a |
rimitives including: symmetric & asymmetric | cryptography; digital signatures; hash functions; bit-co |
lan Turing's research into codebreaking and | cryptography during the Second World War at Bletchley Pa |
In the history of | cryptography, early ciphers, implemented using pen-and-p |
sland, affiliation with cypherpunks, use of | cryptography, etc. |
e delivered the IACR Distinguished Lecture, | Cryptography Everywhere. |
st on episodes of "Binary Revolution", as a | cryptography expert. |
ides cryptographic support through the Java | Cryptography Extension (JCE) with the Bouncy Castle Cryp |
va Secure Socket Extension (JSSE), and Java | Cryptography Extension (JCE). |
order to ascertain integrity, eRT uses SSL | cryptography for all legally binding content it serves. |
third track was dedicated to "Security and | Cryptography Foundations", and in 2009, it is devoted to |
lished in 1949 by Claude Shannon discussing | cryptography from the viewpoint of information theory. |
Usually in | cryptography hard means something like “almost certainly |
In | cryptography, impossible differential cryptanalysis is a |
He has worked on | cryptography, in particular the XSL attack. |
tial deciphering, an interesting example of | cryptography in the 16th century. |
s in 1616, Chess or the King's game, and on | cryptography in 1624: Cryptomenytices et Cryptographiae |
In | cryptography, integral cryptanalysis is a cryptanalytic |
Mathematical | cryptography is usually not the weakest link in a securi |
The book on | cryptography is largely based on earlier work by Trithem |
In | cryptography, key stretching refers to techniques used t |
s well-known products include the RSA BSAFE | cryptography libraries and the SecurID authentication to |
agues tired of having to re-invent a set of | cryptography libraries each time they changed jobs. |
In | cryptography, MDC-2 (Modification Detection Code 2, some |
classified report A Mathematical Theory of | Cryptography, Memorandum MM 45-110-02, Sept. 1, 1945, Be |
In | cryptography, mod n cryptanalysis is an attack applicabl |
tics, physics, bioinformatics, nanobiology, | cryptography, network security, communications engineeri |
f Boolean functions play a critical role in | cryptography, particularly in the design of symmetric ke |
21 February 1962) is a Danish researcher in | cryptography, particularly interested in the design and |
Panama is a | cryptography primitive which can be used both as a hash |
they're capable of making their own strong | cryptography programs without having to rely on professi |
Kotelnikov was also involved in | cryptography, proving the absolute security of the one-t |
Deep Crack was designed by | Cryptography Research, Inc., Advanced Wireless Technolog |
ipal designer was Paul Kocher, president of | Cryptography Research. |
s and major tenants include SquareTrade and | Cryptography Research. |
Stefan Brands is an entrepreneur and former | cryptography researcher whose work has focused on digita |
In | cryptography, rotational cryptanalysis is a generic cryp |
Com systems combined with ECCM methods, and | cryptography secure the communications. |
In | cryptography, sinople is a 128-bit symmetric block ciphe |
ciphers are available alongside asymmetric | cryptography such as RSA, elliptic curve cryptography, d |
GPG message | cryptography support |
SSL and TLS transmission | cryptography support |
In | cryptography, the padding oracle attack is an attack on |
In | cryptography, the boomerang attack is a method for the c |
In | cryptography, the Tiny Encryption Algorithm (TEA) is a b |
In | cryptography, the OpenPGP card is an ISO/IEC 7816-4, -8 |
In | cryptography, Tiger is a cryptographic hash function des |
curves; it was introduced in elliptic curve | cryptography to speed up the addition and doubling formu |
Usually, such communities employ public-key | cryptography to ensure that their users can speak freely |
a broad range of applications, ranging from | cryptography to marine navigation. |
se technologies such as SSL connections and | cryptography to prevent packet sniffing, data inspection |
ng a practical means of applying public key | cryptography to secure network communications. |
In | cryptography, truncated differential cryptanalysis is a |
Nearly all American military World War I | cryptography was done at Fabyan's laboratories, where El |
The Americans were relative newcomers to | cryptography when they entered the war, but they did hav |
lished a book of 600 exercises in classical | cryptography, which was published in the United States a |
Stunnel uses Public-key | cryptography with X.509 digital certificates to secure t |
More recently she has been working in | cryptography: with her husband Andrew Yao and Wang Xiaoy |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |