Skip to main content
Este diccionario, el más completo en el campo de la inteligencia y de la seguridad, cuenta con 1.500 términos definidos en español y con sus correspondientes traducciones al inglés, francés y portugués. Incluye también unos prácticos... more
    • by 
    •   29  
      Military IntelligenceIntelligence StudiesSecurity StudiesSecrecy
With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. Data security is the utmost critical issue in ensuring safe... more
    • by 
    •   33  
      Mathematics of CryptographyComputer ScienceSocial NetworksComputer Engineering
This article examines the evolution of cryptology as a business trait and a distinct state-controlled and -regulated profession in sixteenth-century Venice. It begins by briefly discussing the systematic development of cryptology in the... more
    • by 
    •   5  
      IntelligenceInternational TradeBusiness HistoryCryptology
The phenomena of secrecy have been presented in contextualizing and socially sensitive publications that rarely mention the phenomena of cryptography and code breaking. The secondary literature of cryptography focuses exclusively on... more
    • by 
    •   6  
      Early Modern HistorySecrecyHistory of HungaryCryptology
This article provides a general introduction to the subject of Cryptology, Crytography and Crytoanalysis and explains the terminology and the practical application of security techniques… In recorded History , technological innovations... more
    • by 
    •   18  
      Information SecurityInformation Security AuditingEncryptionInformation Security and Privacy
    • by 
    •   3  
      CryptologySteganography and CryptographyCodex of Rohonc
Information security becomes more important with rapid improvements and changes in information technologies. Today, there are many different attacking techniques that can be used to obtain information or data from especially computer... more
    • by  and +1
    •   10  
      Information SecuritySecurityCryptographyEncryption
In this era of information technology and ecommerce security is the key aspect while transmitting confidential information over insecure network like internet. In order to protect the information, various security mechanisms are used.... more
    • by  and +1
    •   5  
      Applied CryptographyCryptographyCryptologySteganography and Cryptography
Digital signatures are an important primitive for building secure systems and are used in most real world security protocols. However, almost all popular signature schemes are either based on the factoring assumption (RSA) or the... more
    • by  and +2
    •   16  
      Lattice TheoryEmbedded SystemsFPGAApplied Cryptography
Today we regard cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages and documents, as separate domains of activity. But the contiguity, even intimacy... more
    • by 
    •   36  
      PhilologyHumanities Computing (Digital Humanities)History Of ComputingComparative Literature
Today we regard cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages and documents, as separate domains of activity. But the contiguity, even intimacy... more
    • by 
    •   46  
      American LiteraturePhilologyAmerican StudiesHumanities Computing (Digital Humanities)
This paper is based on the performance analysis of message digest 5 and secure hashing algorithm. These two topics are related with cryptography and cryptography is an extension of cryptology and cryptanalysis. The purpose of this paper... more
    • by  and +1
    •   7  
      Information SecurityComputer SecurityCryptographyAnalysis
Paper to be presented at the RT The Agency of Inscriptions in Byzantium, in the West and in the Slavonic World, ICBS, Belgrade, 2016.
    • by 
    •   5  
      Byzantine StudiesByzantine ArchaeologyByzantine EpigraphyCryptology
Cryptography, Steganography and Digital watermarking are widely used for Image Encryption and Textual Data Encryption and also we have various classification of these techniques. In this paper we study of Hybrid Cryptographic Encryption... more
    • by 
    •   22  
      Information SystemsElectronic EngineeringMathematics of CryptographyComputer Science
In this paper we address the issue of privacy preserving data mining. Specifically, we consider a scenario in which two parties owning confidential databases wish to run a data mining algorithm on the union of their databases, without... more
    • by 
    •   15  
      Information SystemsData MiningSoft ComputingPure Mathematics
A comparison  of English, Japanese, and Navajo "code talk" understandings based in the cultural context of perception. Focus on the combat code developed by Diné talkers in the USA Marine Corps during WWII in the Pacific combat theatre.
    • by 
    •   16  
      SemioticsJapanese StudiesAnthropologyCommunication
This essay proposes that securitization is underwritten by stupidity, defined as a shared social exposure to limits which condition the possibility of thinking, knowing, and communicating about threats and responses. This... more
    • by 
    •   13  
      EpistemologyCommunicationCritical Discourse StudiesRhetoric
Sözde rastsal sayı üreteçleri ürettiği sayılar dizisi arasında ilişki kurulamayacak algoritma türleridir. Rastsal sayı üretimi fiziksel ve istatistiksel çalışmalardan kriptoloji başta olmak üzere birçok bilimsel çalışmada... more
    • by 
    •   3  
      Artificial Neural NetworksPseudo-Random Number GeneratorCryptology
We describe results from an apparatus and protocol designed to implement quantum key distribution, by which two users, who share no secret information initially: (1) exchange a random quantum transmission, consisting of very faint flashes... more
    • by 
    •   10  
      Quantum PhysicsQuantum CryptographyProtocol DesignPure Mathematics
In the treatment of chronic diseases, wireless Implantable Medical Devices (IMDs) are commonly used to communicate with an outside programmer. Such communication raises serious security concerns, such as the ability for hackers to gain... more
    • by  and +1
    • Cryptology
The present world order is an invalid fallacy, a mere delusion to please the fancy of the self-styled elites – all those who plunged the entire Mankind into injustice, bias, inhumanity, falsehood, discord, bloodshed, abject poverty for... more
    • by 
    •   31  
      ReligionHistoryCultural HistoryCultural Studies
The goal of this paper is A) to suggest topics for a peircean semeiotics of cryptology and B) to show that, especially when compared with previous attempts, peircean semeiotics are better suited to the study of the semiotic processes in... more
    • by 
    •   5  
      SemioticsCharles S. PeirceCryptographySteganography
berbagi untuk kemajuan ilmu pengetahuan
    • by 
    • Cryptology
The distinction between the Domain of Natural Numbers and the Domain of Line gets highlighted. This division provides the new perception to the Fermat's Conjecture, where to place it and how to prove it. The reasons why the Fermat's... more
    • by 
    •   6  
      Number TheoryElliptic curvesCryptologyArithmetic
This paper discusses the attempt of an algorithmic approach to contribute to the decipherment of Linear A. With the assistance of software developed in Python, Linear A clusters can be compared to various dictionaries of languages... more
    • by 
    •   19  
      AlgorithmsWriting Systems & DeciphermentGrammatologyHistory of Reading and Writing
In many cases the security of a cryptographic scheme based on computational Diffie–Hellman does in fact rely on the hardness of the decision Diffie–Hellman problem. In this paper we construct concrete examples of groups where the stronger... more
    • by 
    •   7  
      Pure MathematicsCryptologyMediërende En Modererende MechanismenNumerical Analysis and Computational Mathematics
In many cases the security of a cryptographic scheme based on computational Diffie–Hellman does in fact rely on the hardness of the decision Diffie–Hellman problem. In this paper we construct concrete examples of groups where the stronger... more
    • by 
    •   7  
      Pure MathematicsCryptologyMediërende En Modererende MechanismenNumerical Analysis and Computational Mathematics
– An increase in number of attack recorded during electronic exchange of information between the sender and the recipient in the recent years has called for a way to protect data in a robust manner. Most data transmitted over a network is... more
    • by 
    • Cryptology
    • by 
    •   5  
      Information SecuritySecurityCryptographyInternet Communication
The article presents the decipherment and translation of a little-known letter (1460) of King John II of Aragon found in the archive of the Saint Petersburg Institute of History of Russian Academy of Sciences. The author demonstrates his... more
    • by 
    •   11  
      Medieval HistorySpanish HistoryMediterranean StudiesCatalan History
We study the design of cryptographic primitives resistant to a large class of side-channel attacks, called “memory attacks”, where an attacker can repeatedly and adaptively learn information about the secret key, subject only to the... more
    • by 
    •   6  
      CryptologyAdaptive learningPublic key cryptographyLarge classes
This paper is based on the proposed results shown in my other papers on (or hopefully soon to be on) Academia.edu. The Voynich Manuscript is considered the world's most mysterious manuscript. It uses a strange alphabet to form strange... more
    • by 
Cryptologia Publication details, including instructions for authors and subscription information: Abstract In 1967's The Broken Seal: The Story of ''Operation Magic'' and the Pearl Harbor Disaster, Ladislas Farago claimed that Herbert... more
    • by 
    •   2  
      CryptographyCryptology
We consider a security property of encryption schemes that has been surfacing increasingly often of late. We call it "key-privacy" or "anonymity". It asks that an eavesdropper in possession of a ciphertext not be able to tell which... more
    • by 
    •   10  
      AnonymityEncryptionSecurity RequirementsCryptology
—Debit card or ATM card frauds had been a major sector of concern due to which Reserve Bank of India (RBI) has set new guidelines since December 1, 2013. Now you will have to enter your personal identification number (PIN) every time you... more
    • by 
    •   3  
      Chaos TheoryCryptographyCryptology
Cryptography is taught with the basic rule that there is no such thing as an unbreakable encryption because “If someone tries enough keys he is bound to get the right one,” which gives rise to the basis of the brute force attack. Brute... more
    • by 
    •   5  
      Mathematics of CryptographyCryptographyEncryptionCryptology
Linear A is an ancient writing system that was used on the island of Crete and a few surrounding Aegean areas between 1750 and 1450 BC to represent the Minoan language(s). Linear A is believed to be a syllabic script, but has yet to be... more
    • by 
    •   20  
      Historical LinguisticsWriting Systems & DeciphermentEtymologyAegean Archaeology
This is a comparison between merperson (mermaids and mermen) images in the Voynich Manuscript and other medieval merperson images with similar characteristics.
    • by 
    •   18  
      Art HistoryArtHistory of ArtCryptography
In this paper create a new block encryption algorithm based on network RFWKPES4–2, with the use the round function of algorithm GOST 28147–89. The block length of created encryption algorithm is 128 bits, the number of rounds is 8, 12 and... more
    • by  and +1
    • Cryptology
The Voynich manuscript is the book dated as fifteen century, written using specific and smart coding methods. This article describes the methods how it was analyzed and how coding keys were found. The last manuscript page decoding.... more
    • by 
    •   8  
      LogicHistory of LogicCryptographyCosmology
Elliptic curves were being used only for mathematical studies until Miller and Koblitz introduced elliptic curves to crypto-community in 1985 with independent works. Since then, elliptic curves became one of the most significant tools in... more
    • by 
    •   6  
      CryptographyPublic Key Crypto systemsElliptic curvesCryptology
We propose constructing provable collision resistant hash functions from expander graphs in which finding cycles is hard. As examples, we investigate two specific families of optimal expander graphs for provable hash function... more
    • by 
    •   8  
      Group TheoryPure MathematicsCryptologyNumerical Analysis and Computational Mathematics
An authenticated encryption scheme is a symmetric encryption scheme whose goal is to provide both privacy and integrity. We consider two possible notions of authenticity for such schemes, namely integrity of plaintexts and integrity of... more
    • by 
    •   4  
      Pure MathematicsCryptologyNumerical Analysis and Computational MathematicsData Format
The Data Encryption Standard (DES) is the best known and most widely used cryptosystem for civilian applications. It was developed at IBM and adopted by the National Buraeu of Standards in the mid 70’s, and has successfully withstood all... more
    • by 
    •   8  
      Pure MathematicsCryptologyDifferential cryptanalysisNumerical Analysis and Computational Mathematics
    • by 
    •   3  
      CryptologySecret SharingInfinite Domain
(this is a new version of my other paper "Some neglected arguments for the reality of Peirce’s cryptology") (WARNING: according to at least two Peirce scholars, this is badly written; sorry about that, I do my best... I still hope this... more
    • by 
    •   4  
      Charles S. PeirceCryptanalysisCryptologyPeircean Logic
The Weil pairing, first introduced by André Weil in 1940, plays an important role in the theoretical study of the arithmetic of elliptic curves and Abelian varieties. It has also recently become extremely useful in cryptologic... more
    • by 
    •   7  
      Pure MathematicsCryptologyEfficient Algorithm for ECG CodingNumerical Analysis and Computational Mathematics
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. Side-channel attacks that are based on multiple measurements of the same operation can be countered by employing masking techniques. Many... more
    • by 
    •   22  
      Distributed ComputingCryptographyVulnerabilityPure Mathematics
    • by 
    •   3  
      Mathematics of CryptographyCryptographyCryptology
    • by 
    •   4  
      CryptologyRandom Oracle ModelElliptic Curve CryptographyTrusted Third Party