Back to Results
First PageMeta Content
Block cipher / Symmetric-key algorithm / Playfair cipher / Ciphertext / Cipher / One-time pad / Keystream / Cryptanalysis / Cryptographic hash function / Cryptography / Stream ciphers / Substitution cipher


Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography
Add to Reading List

Document Date: 2007-02-27 09:35:26


Open Document

File Size: 1,66 MB

Share Result on Facebook

City

London / /

Company

Bank of Santa Barbara / HSBC Bank Cambridge / Lombard Bank / Building Dependable Distributed Systems / /

Country

United States / /

Currency

GBP / USD / /

Facility

Building Dependable Distributed Systems There / Wheatstone bridge / Building Dependable Distributed Systems The / /

IndustryTerm

authentication protocol / authentication systems / bank account number / mechanical cipher devices / bank procedures / crypto tools / encryption/decryption device / real systems / bank auditors / implementation technology / bank / important cryptographic algorithms / published solution / banking / public key encryption algorithm / signature algorithms / online timestamping service / cryptographic protocol / security protocols / hardware applications / /

NaturalFeature

MT. / /

Organization

Prussian infantry / British army / /

Person

Playfair One / JOHN F. KENNEDY / Doreen Smith / G. JULIUS CAESAR XYAWO GAOOA GPEMO HPQCW / Albert / Blaise de Vigenère / Leo Marks / Charles Babbage / Heil Hitler / John Smith / Charles Wheatstone / Gilbert Vernam / Augustus Caesar / Friedrich Kasiski / Claude Shannon / /

Position

Special Operations Executive / Prime Minister / computer scientist / security engineer / politician / officer / crooked telegraph clerk / bank security consultant / Prince / spy / King / diplomat / surgeon / analyst / /

ProvinceOrState

New Brunswick / /

Technology

authentication protocol / important cryptographic algorithms / competing technology / cryptographic protocol / block cipher / mobile phones / implementation technology / private key / security protocols / secret key / A5 algorithm / key enabling technology / encryption / cellular telephone / Cryptography / public key / artificial intelligence / ASCII / GSM / digital signature / public key encryption algorithm / stream cipher / signature algorithms / dialysis / /

SocialTag