cryptographic

Definitions

  • WordNet 3.6
    • adj cryptographic of or relating to cryptanalysis
    • ***
Webster's Revised Unabridged Dictionary
    • a Cryptographic Relating to cryptography; written in secret characters or in cipher, or with sympathetic ink.
    • ***
Century Dictionary and Cyclopedia
    • cryptographic Written in secret characters or in cipher: as, a cryptographic despatch.
    • cryptographic Designed or contrived for writing in secret characters: as, a cryptographic machine.
    • cryptographic In petrography, noting a fabric formed by the graphic intergrowth of two minerals, but so minute as not to be seen by the unaided eye.
    • ***

Usage

In literature:

Most of them are cryptographic abbreviations, not readily deciphered now.
"Mark Twain, A Biography, 1835-1910, Complete" by Albert Bigelow Paine
Let us see what 1804 will give us as a cryptographical number.
"Eight Hundred Leagues on the Amazon" by Jules Verne
My cryptograph won't depend on books.
"The Red Redmaynes" by Eden Phillpotts
But what of the rest of this monstrous cryptograph?
"A Journey to the Centre of the Earth" by Jules Verne
As it was, I assumed the cryptograph to be English.
"The Short-story" by William Patterson Atkinson
Isn't this what you call a cryptograph?
"The Paternoster Ruby" by Charles Edmonds Walk
As it was, I assumed the cryptograph to be English.
"International Short Stories" by Various
Then there was the matter of the NSA cryptographer who had been given an intercepted copy of the protocol.
"Project Daedalus" by Thomas Hoover
It is a cryptograph, but a simple one, familiar to school children.
"Nooks and Corners of Old New York" by Charles Hemstreet
Hence certain cryptographers have set to work and formed the theory of a hidden meaning in all this.
"The Great God Gold" by William Le Queux
***

In news:

This upgrade enables the Smart-Clone to clone specific automotive cryptographic transponders from Chrysler, Ford, Kia, Lexus, Mazda, Mitsubishi, Nissan, Subaru and Toyota.
Cryptographic Authentication IC Family Prevents Cloning, Secures Data.
The AT88SA family of lowest cost, ultra low power, super secure cryptographic authentication ICs.
However, being a novelty in the cryptographic world, its security has not been thoroughly studied.
Ever since Artur Ekert harnessed this phenomenon to distribute cryptographic keys in 1991, the field has bourgeoned.
In this chapter we will look at choosing and optimizing cryptographic algorithms, particularly for resource-constrained systems, such as embedded systems.
Suite B is the set of cryptographic algorithms recommended by the National Security Agency (NSA) to secure government communications.
Enterprises can't just store cryptographic hashes of user passwords and think they are protected, as attackers spend the time and resources to run them against dictionaries.
Attacks based on an implementation flaw of the Secure Sockets Layer (SSL) cryptographic protocol will be demonstrated on Friday by two security researchers.
The fact that the standard emerged from a country known more for its chocolate than for its software shows the international nature of the cryptographic field.
Until recently, Google, Yahoo, eBay and Amazon were using weak cryptographic signatures to digitally "sign" their own emails — and they still would be had a Florida mathematician not discovered the glaring security hole.
Unless you are a cryptographer, that is.
Biomedical researchers would benefit from emulating the logically rigorous reasoning of the late Alan Turing , British mathematician, computer scientist, and master cryptographer.
***

In science:

The channel capacity is observed to be minimum, that is 0, when fair coin is used by the cryptographers.
Statistical Analysis of Privacy and Anonymity Guarantees in Randomized Security Protocol Implementations
As the coin is made unfair, channel capacity rises and attains its maximum value which is close to log of the number of cryptographers when the coin is completely biased.
Statistical Analysis of Privacy and Anonymity Guarantees in Randomized Security Protocol Implementations
Most, if not all, of these schemes rely on the presence of one of the most fundamental cryptographic primitives, random number generation.
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
Many times cryptographic data, such as keys, are stored in RAM.
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
In many cases, traditional cryptographic solutions can not be used by RFID tags due to their low computational and memory capabilities.
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
Other protocols that are based on pseudorandom functions will also require cryptographic random numbers to be generated.
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
We intend to analyze ways in which entropy sources such as these can be aggregated to efficiently produce the amount of randomness necessary to support various cryptographic protocols aimed at low cost tags.
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
This raises a serious question: how much can we trust a RNG? The weakness of a RNG could be fatal if the generated random numbers have been used as secure keys in a cryptographic system where the security relies on the true randomness of the key.
Experimental demonstration of a high speed quantum random number generation scheme based on measuring phase noise of a single mode laser
To address some of the difficulties Eschenauer and Gligor have recently propos ed the following random key predistribution scheme: Before deployment, each sensor in a WSN is independently assigned K distinct cryptographic keys which are selected at random from a pool of P keys (with K < P ).
Zero-one laws for connectivity in random key graphs
Eschenauer and Gligor : Before deployment, each sensor in a WSN is independently assigned K distinct cryptographic keys which are selected at random from a pool of P keys.
A zero-one law for the existence of triangles in random key graphs
It is thereby possible to design of a new type of cryptographically secure random number generator which does not require any assumption on the internal working of the devices.
Random Numbers Certified by Bell's Theorem
Rukhin, A. et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications.
Random Numbers Certified by Bell's Theorem
The space-like separation approach may be relevant for non-cryptographic applications of random numbers, where privacy is not an issue, such as Monte Carlo algorithms.
Random Numbers Certified by Bell's Theorem
From the basic cryptographic requirement that the two devices can be adequately shielded so that they do not send information to the adversary, it is only a small extra step to require that they can also be adequately shielded so that they cannot signal to each other.
Random Numbers Certified by Bell's Theorem
Rukhin, A. et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications.
Random Numbers Certified by Bell's Theorem
***