「cryptography」の共起表現(2語右で並び替え) - Weblio英語共起表現検索


小窓モード

プレミアム

ログイン
設定

設定

Weblio 辞書 > 英和辞典・和英辞典 > cryptographyの意味・解説 > cryptographyに関連した共起表現

「cryptography」の共起表現一覧(2語右で並び替え)

該当件数 : 94



al studies to use by developing a system of cryptography and a coding machine that came to be widely
the Restoration, engaging in espionage and cryptography - activities that later helped him enter th
order to ascertain integrity, eRT uses SSL cryptography for all legally binding content it serves.
ude not only high-performance computing for cryptography, but also cryptography itself, network secu
s well-known products include the RSA BSAFE cryptography libraries and the SecurID authentication to
third track was dedicated to "Security and Cryptography Foundations", and in 2009, it is devoted to
ppears in combinatorics, complexity theory, cryptography and applied mathematics.
ciphers are available alongside asymmetric cryptography such as RSA, elliptic curve cryptography, d
rring decimals for error correction coding, cryptography and as random sequences.
g solutions provider in the mobile banking, cryptography and banking technology space.
In cryptography, the boomerang attack is a method for the c
hat the British forces captured the Italian cryptography code, but this assertion is dismissed by th
In cryptography, a Cipher Block Chaining Message Authentica
C conjecture, to modular forms on GL(n), to Cryptography (Arithmetica cipher, Anshel-Anshel-Goldfeld
In the history of cryptography, early ciphers, implemented using pen-and-p
He offers courses on cryptography and coding theory.
as include computational complexity theory, cryptography and computational number theory.
ects such as the Semantic Web, World War II cryptography and computer programming) and the prize-giv
In cryptography, black-bag cryptanalysis is a euphemism for
In cryptography, integral cryptanalysis is a cryptanalytic
In cryptography, rotational cryptanalysis is a generic cryp
11, 1973) is an American cryptographer and cryptography consultant, currently the president and chi
In cryptography, impossible differential cryptanalysis is a
In cryptography, truncated differential cryptanalysis is a
In cryptography, a distinguishing attack is any form of cry
In cryptography, a DMA attack is a type of side channel att
Nearly all American military World War I cryptography was done at Fabyan's laboratories, where El
agues tired of having to re-invent a set of cryptography libraries each time they changed jobs.
frastructure protection, Internet security, cryptography, counter eavesdropping, certification of se
Usually, such communities employ public-key cryptography to ensure that their users can speak freely
nsfer, which utilizes the so-called quantum cryptography (involving entangled states of pairs of par
In cryptography, differential equations of addition (DEA) a
SAFER (cipher), in cryptography, a family of block ciphers
philosophy, chess, animal rights, medicine, cryptography and film criticism.
More recently she has been working in cryptography: with her husband Andrew Yao and Wang Xiaoy
boundary between permitted ("low-strength") cryptography and impermissible ("high-strength") cryptog
at the University of Passau, researching in cryptography and in computational commutative algebra.
f Boolean functions play a critical role in cryptography, particularly in the design of symmetric ke
Deep Crack was designed by Cryptography Research, Inc., Advanced Wireless Technolog
RSA Security Conference, Cryptography and information security-related conference
21 February 1962) is a Danish researcher in cryptography, particularly interested in the design and
Anti-circumvention Regulations", Financial cryptography: 4th international conference, FC 2000, Edi
ngineering in 2009 for his contributions to cryptography and Internet security.
In cryptography, an interpolation attack is a type of crypt
In cryptography, sinople is a 128-bit symmetric block ciphe
ith Gilles Brassard, the concept of quantum cryptography and is one of the founding fathers of moder
In cryptography, Tiger is a cryptographic hash function des
In cryptography, a key signing party is an event at which p
The book on cryptography is largely based on earlier work by Trithem
vision, personal privacy (personal rights), cryptography and many more).
a broad range of applications, ranging from cryptography to marine navigation.
Usually in cryptography hard means something like “almost certainly
e from UC Berkeley and completed his PhD in cryptography at MIT, in the Theory of Computation group.
classified report A Mathematical Theory of Cryptography, Memorandum MM 45-110-02, Sept. 1, 1945, Be
uary 2, 1952) is a researcher in public key cryptography, and more recently a researcher and speaker
In cryptography, mod n cryptanalysis is an attack applicabl
d that governs implementation of public-key cryptography based on the RSA algorithm.
In cryptography, the OpenPGP card is an ISO/IEC 7816-4, -8
In cryptography, the padding oracle attack is an attack on
He has worked on cryptography, in particular the XSL attack.
se technologies such as SSL connections and cryptography to prevent packet sniffing, data inspection
The intersection of public-key cryptography and public policy or a political ideology (
onal science including spintronics, quantum cryptography and quantum computing.
sics - notably quantum nonlocality, quantum cryptography, and quantum teleportation.
In cryptography, a random oracle is an oracle (a theoretica
ng a practical means of applying public key cryptography to secure network communications.
tics, physics, bioinformatics, nanobiology, cryptography, network security, communications engineeri
statistical design, communications theory, cryptography, computer security, and a host of other pra
rimitives including: symmetric & asymmetric cryptography; digital signatures; hash functions; bit-co
curves; it was introduced in elliptic curve cryptography to speed up the addition and doubling formu
ordinarily secure, relying upon private key cryptography and SSL to ensure confidentiality of users'
In cryptography, key stretching refers to techniques used t
In cryptography, a subgroup confinement attack (or small su
piration of the basic patents on public key cryptography and the widespread use of laptop computers
lan Turing's research into codebreaking and cryptography during the Second World War at Bletchley Pa
Other recurring subjects include cryptography and the effects of technically ill-consider
Com systems combined with ECCM methods, and cryptography secure the communications.
tial deciphering, an interesting example of cryptography in the 16th century.
lished in 1949 by Claude Shannon discussing cryptography from the viewpoint of information theory.
Kotelnikov was also involved in cryptography, proving the absolute security of the one-t
will be discussed with how to teach / learn Cryptography, Coding Theory, Graph Theory, during 27-31
th work on computational complexity theory, cryptography, coding theory, and game theory.
The Americans were relative newcomers to cryptography when they entered the war, but they did hav
In cryptography, a timing attack is a side channel attack i
In cryptography, the Tiny Encryption Algorithm (TEA) is a b
Mathematical cryptography is usually not the weakest link in a securi
to attending several conferences (Financial Cryptography 98, various MIT presentations), participati
lished a book of 600 exercises in classical cryptography, which was published in the United States a
In cryptography, a watermarking attack is an attack on disk
Panama is a cryptography primitive which can be used both as a hash
Stefan Brands is an entrepreneur and former cryptography researcher whose work has focused on digita
they're capable of making their own strong cryptography programs without having to rely on professi
helped organize the first Selected Areas in Cryptography (SAC) workshop in 1994.
Stunnel uses Public-key cryptography with X.509 digital certificates to secure t
                                                                                                    


こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する
英→日 日→英
こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する

©2024 GRAS Group, Inc.RSS