Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 50 results in range #101 to #150.

View ( | ) (20 | 50 | 100 | 250 | 500)

  1. DES-GENERATED CHECKSUMS FOR ELECTRONIC SIGNATURES: Label: en
  2. Enigma's Contemporary Witness: Gisbert Hasenjaeger: Label: en
  3. Cracking Hill Ciphers with Goodness-of-Fit Statistics: Label: en
  4. Attacking Letter Substitution Ciphers with Integer Programming: Label: en
  5. Speeding Up the Double-Base Recoding Algorithm of Scalar Multiplication∗: Label: en
  6. Algebraic Cryptanalysis of Simplified AES∗: Label: en
  7. Charting Arabic Cryptology's Evolution∗: Label: en
  8. Cryptology in the Classroom: Analyzing a Zero-Knowledge Protocol: Label: en
  9. Cryptanalysis of a Hash Function Based on Norm Form Equations: Label: en
  10. A Belated Tribute to Rosario Candela: Label: en
  11. From the Archives: Intercepting Best Friend?: Label: en
  12. Breaking Short Playfair Ciphers with the Simulated Annealing Algorithm: Label: en
  13. Cicco Simonetta's Cipher-Breaking Rules: Label: en
  14. The Future of the Past—Questions in Cryptologic History: Label: en
  15. Lessons Learned from a Mathematical Cryptology Course: Label: en
  16. Oblivious Transfer Based on Key Exchange: Label: en
  17. Key Enclosed: Examining the Evidence for the Missing Key Letter of the Beale Cipher: Label: en
  18. Taking a Cryptology Class to Bletchley Park: Label: en
  19. Improved Related-key Attacks on DESX and DESX+: Label: en
  20. Reading Encrypted Diplomatic Correspondence: An Undergraduate Research Project: Label: en
  21. NIST Block Cipher Modes of Operation for Confidentiality: Label: en
  22. Deciphering an Undergraduate Cryptology Course: Label: en
  23. Secret Codes and Online Security: A Seminar for Entering Students: Label: en
  24. Why Don't We Decipher an Outdated Cipher System? The Codex of Rohonc: Label: en
  25. “I Shall Love You Until Death” (Marie-Antoinette to Axel von Fersen): Label: en
  26. Solving the Running Key Cipher with the Viterbi Algorithm: Label: en
  27. Julius Petersen—Danish Mathematician and Cryptologist: Label: en
  28. Clustering and Categorization Applied to Cryptanalysis: Label: en
  29. Solving XOR Plaintext Strings with the Viterbi Algorithm: Label: en
  30. Augmented Watermarking: Label: en
  31. The Cycle Structure and Order of the Rail Fence Cipher: Label: en
  32. In Memory of Jack Levine (1907–2005): Label: en
  33. The Whirlpool Secure Hash Function: Label: en
  34. Bellaso's Reciprocal Ciphers: Label: en
  35. Alexis Køhl: A Danish Inventor of Cryptosystems: Label: en
  36. AN EXTENSION OF HILL CIPHER USING GENERALISED INVERSES AND mth RESIDUE MODULO n: Label: en
  37. CRYPTOLOGY IN GENERAL EDUCATION: Label: en
  38. ON THE KEYSPACE OF THE HILL CIPHER: Label: en
  39. WATERMARKING USING DECIMAL SEQUENCES: Label: en
  40. BLACK-BOX ATTACK USING NEURO-IDENTIFIER: Label: en
  41. BREAKING LITTLEWOOD'S CIPHER: Label: en
  42. WAVELET-BASED STEGANOGRAPHY: Label: en
  43. IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS OF MINI-AES: Label: en
  44. CLAUDE COMIERS: THE FIRST ARITHMETICAL CRYPTOGRAPHY: Label: en
  45. A SIMPLIFIED AES ALGORITHM AND ITS LINEAR AND DIFFERENTIAL CRYPTANALYSES: Label: en
  46. A STATISTICAL ATTACK ON THE RUNNING KEY CIPHER: Label: en
  47. A TUTORIAL ON LINEAR AND DIFFERENTIAL CRYPTANALYSIS: Label: en
  48. FURTHER NOTES FOR A SELF-STUDY COURSE IN BLOCK-CIPHER CRYPTANALYSIS: Label: en
  49. JOHANN FRIEDRICH EULER (1741–1800): MATHEMATICIAN AND CRYPTOLOGIST AT THE COURT OF THE DUTCH STADHOLDER WILLIAM V: Label: en
  50. GENETIC ALGORITHMS CAN BE USED TO OBTAIN GOOD LINEAR CONGRUENTIAL GENERATORS: Label: en

View ( | ) (20 | 50 | 100 | 250 | 500)