Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 50 results in range #51 to #100.

View ( | ) (20 | 50 | 100 | 250 | 500)

  1. THE CRYPTOGRAPHIC MATHEMATICS OF ENIGMA: Label: en
  2. THE LORENZ CIPHER MACHINE SZ42: Label: en
  3. WILLIAM F. FRIEDMAN'S TRANSCRIPTION OF THE VOYNICH MANUSCRIPT: Label: en
  4. ON THE SECURITY OF PARK ET AL.'S KEY DISTRIBUTION PROTOCOL FOR DIGITAL MOBILE COMMUNICATIONS: Label: en
  5. RADIO INTELLIGENCE AND SECURITY: Label: en
  6. CRYPTANALYSIS OF THE SWEDISH HC-9 A KNOWN-PLAINTEXT APPROACH: Label: en
  7. DRAWBACKS OF THE ONE-TIME PAD: Label: en
  8. CRYPTOGRAPHY AS A TEACHING TOOL: Label: en
  9. THE SIGCUM STORY: CRYPTOGRAPHIC FAILURE, CRYPTOLOGIC SUCCESS: Label: en
  10. HOW TO BREAK GIFFORD'S CIPHER: Label: en
  11. BUNDESWEHRTARNVERFAHREN: Label: en
  12. LOBSTERS, CRABS, AND THE ABWEHR ENIGMA: Label: en
  13. AN INDUS-SARASVATĪ SIGNBOARD: Label: en
  14. CRYPTANALYSIS OF SUBSTITUTION-PERMUTATION NETWORKS USING KEY-DEPENDENT DEGENERACY: Label: en
  15. DESIGNING A HIGH-SECURITY CIPHER: Label: en
  16. ON FACTORING JEVONS' NUMBER: Label: en
  17. CRYPTOLOGY IN THE 15th AND 16th CENTURY: Label: en
  18. CRYPTOLOGY IN THE EARLY BUNDESREPUBLIK: Label: en
  19. CONSPIRACY ATTACKS ON THE THRESHOLD RSA SIGNATURE SCHEME: Label: en
  20. A MULTILOOP VIGENÈRE CIPHER WITH EXCEPTIONALLY LONG COMPONENT SERIES: Label: en
  21. AN ALGORITHM FOR THE COMPLETE AUTOMATED CRYPTANALYSIS OF PERIODIC POLYALPHABETIC SUBSTITUTION CIPHERS: Label: en
  22. ESTIMATING POPULATION FROM REPETITIONS IN ACCUMLATED RANDOM SAMPLES: Label: en
  23. CRYPTANALYSIS ON SCHWARTZ GRAPHICAL ENCRYPTION METHOD: Label: en
  24. REALIZING DIGITAL SIGNATURES WITH ONE-WAY HASH FUNCTIONS: Label: en
  25. THE QUADRATIC RESIDUE CIPHER AND SOME NOTES ON IMPLEMENTATION: Label: en
  26. THE INCLUSION-EXCLUSION PRINCIPLE AND ITS APPLICATIONS TO CRYPTOGRAPHY: Label: en
  27. A NONLINEAR RANDOM NUMBER GENERATOR WITH KNOWN, LONG CYCLE LENGTH: Label: en
  28. THE TWO-MESSAGE PROBLEM IN THE HILL CRYPTOGRAPHIC SYSTEM WITH UNKNOWN CIPHER ALPHABET: Label: en
  29. MIMIC FUNCTIONS: Label: en
  30. A PUBLIC KEY CRYPTOSYSTEM BASED ON COMPLEMENTING SETS: Label: en
  31. ALL ARE WELL AT BOLDON A MID-VICTORIAN CODE SYSTEM: Label: en
  32. ORIGINS OF CRYPTOLOGY: THE ARAB CONTRIBUTIONS: Label: en
  33. SHERLOCK HOLMES IN BABYLON: Label: en
  34. APPLICATIONS OF THE DRAZIN INVERSE TO THE HILL CRYPTOGRAPHIC SYSTEM. PART IV.: Label: en
  35. APPLICATIONS OF THE DRAZIN INVERSE TO THE HILL CRYPTOGRAPHIC SYSTEM. PART III.: Label: en
  36. ERROR-CORRECTING CODES AND CRYPTOGRAPHY PART I: Label: en
  37. APPLICATIONS OF THE DRAZIN INVERSE TO THE HILL CRYPTOGRAPHIC SYSTEM. PART II.: Label: en
  38. SECURITY OF NUMBER THEORETIC PUBLIC KEY CRYPTOSYSTEMS AGAINST RANDOM ATTACK, III: Label: en
  39. SECURITY OF NUMBER THEORETIC PUBLIC KEY CRYPTOSYSTEMS AGAINST RANDOM ATTACK, II: Label: en
  40. SECURITY OF NUMBER THEORETIC PUBLIC KEY CRYPTOSYSTEMS AGAINST RANDOM ATTACK, I: Label: en
  41. APPLICATIONS OF THE DRAZIN INVERSE TO THE HILL CRYPTOGRAPHIC SYSTEM. PART I.: Label: en
  42. PUBLIC KEY CRYPTOSYSTEM USING A RECIPROCAL NUMBER WITH THE SAME INTRACTABILITY AS FACTORING A LARGE NUMBER: Label: en
  43. SECURING THE RSA-CRYPTOSYSTEM AGAINST CYCLING ATTACKS: Label: en
  44. CHOSEN-KEY ATTACKS ON A BLOCK CIPHER: Label: en
  45. EXTENSION OF RSA CRYPTOSYSTEMS TO MATRIX RINGS: Label: en
  46. SOME PUBLIC-KEY CRYPTO-FUNCTIONS AS INTRACTABLE AS FACTORIZATION: Label: en
  47. REMARKS ON THE AUTO-CORRELATION FUNCTION OF BINARY PERIODIC SEQUENCES: Label: en
  48. INFORMATION THEORETIC APPROACH TO SECURE LSFR CIPHERS: Label: en
  49. A NEW METHOD FOR REALIZING PUBLIC-KEY CRYPTOSYSTEM: Label: en
  50. THE PROBLEM OF RECIPROCITY IN A DELASTELLE DIGRAPHIC SUBSTITUTION: Label: en

View ( | ) (20 | 50 | 100 | 250 | 500)