Search results

Jump to: navigation, search
  • The Alphabet Cipher (category Cryptography)
    The Alphabet-Cipher in 1868, possibly in a children's magazine. It describes what is known as a Vigenère cipher, a well-known scheme in cryptography.
    3 KB (489 words) - 21:19, 2 January 2011
  • Thomas “Fuller, Thomas” in Encyclopædia Britannica (9th ed.), 1879. “Cryptography,” in Encyclopædia Britannica, (11th ed.), 1911 Death: John Eglington
    2 KB (290 words) - 00:41, 29 August 2015
  • A Few Words on Secret Writing (category Cryptography)
    Ancient and Modern," maintains that the Spartans were the inventors of Cryptography, is obviously in error. He speaks of the scytala as being the origin
    30 KB (5,184 words) - 03:13, 1 July 2015
  • notice of bibliographers, appeared with this title: 'Stenography and Cryptography. The Arts of Short and Secret Writing. The second Edition enlarged, with
    314 bytes (423 words) - 06:40, 24 January 2013
  • Secret and Swift Messenger (1641), the first English-language book on cryptography Ecclesiastes (1646), a plea for a plain style in preaching Mathematical
    2 KB (234 words) - 15:06, 5 May 2016
  • would lead to the exposure of Government techniques and practices in the cryptography field to unauthorized persons and thus compromise the Government's efforts
    24 KB (3,848 words) - 04:36, 2 May 2011
  • Cruz e Silva, Antonio Diniz da Cryolite Crypt Crypteia Cryptobranchus Cryptography Cryptomeria Crypto-porticus Crystal-gazing Crystallite Crystallization
    3 KB (12 words) - 21:30, 27 February 2011
  • CYRIL, M.A. (C. BA.) Roman Religion. BAILEY, JOHN EGLINTON. (J. E. B.) Cryptography. BAILEY, LIBERTY HYDE, LL.D. (L. H. B.) Horticulture, American (in part)
    46 KB (8,642 words) - 15:19, 19 April 2016
  • Bidder, Junr. (1836-1896), who inherited much of his father’s calculating power, was a successful parliamentary counsel and an authority on cryptography.
    348 bytes (798 words) - 01:16, 24 January 2015
  • away" photographs of defense installations. Section 798, relating to cryptography, applies to whoever: "communicates, furnishes, transmits, or otherwise
    9 KB (1,375 words) - 23:21, 2 July 2011
  • frequently afterwards, entitling him to high rank among the early writers on cryptography); Phytognomonica (1583, a bulky treatise on the physiology of plants
    516 bytes (350 words) - 18:17, 23 April 2016
  • 1903 Wild Flowers in their Seasons, 1907 Familiar Swiss flowers, 1908 Cryptography: or, The history, principles, and practice of cipher-writing Myth-land
    1 KB (221 words) - 10:32, 29 August 2015
  • processing Z53-102     Shorthand. Stenography. Phonography Z102.5-104.5     Cryptography. Ciphers. Invisible writing Z105-115.5   Manuscripts. Paleography Z116-659
    5 KB (39 words) - 14:23, 15 March 2011
  • information or material requiring special handling, such as intelligence and cryptography. This information and material is excluded from automatic downgrading
    17 KB (281 words) - 10:41, 16 March 2010
  • information or material specifically covered by statute, or pertaining to cryptography, or disclosing intelligence sources or methods. (3) Classified information
    30 KB (4,187 words) - 09:07, 9 July 2013
  • power over it he was unequalled, except perhaps by Charles Babbage. A cryptographic machine, which changed the cipher automatically and printed a message
    564 bytes (1,069 words) - 15:38, 23 April 2016
  • large scale attack, (B) war plans, (c) communications intelligence or cryptographic information, or (D) any other major weapons system or major element
    28 KB (4,329 words) - 12:56, 27 January 2010
  • Therefore PPS provides a more accurate position than does SPS. Two cryptographic methods are employed to deny PPS accuracy to civilian users: selective
    49 KB (7,344 words) - 00:39, 4 May 2014
  • Thoughts to a Friend at any Distance,’ 1641; a very ingenious work on cryptography and modes of rapid correspondence. 4. ‘Ecclesiastes, or a Discourse concerning
    326 bytes (2,776 words) - 11:01, 31 January 2011
  • Electronic transactions; a.4. Telephone call transactions; b. The cryptographic functionality cannot easily be changed by the user; c. Designed for
    27 KB (4,285 words) - 11:59, 30 March 2011

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)