cryptographic

Definitions

  • WordNet 3.6
    • adj cryptographic of or relating to cryptanalysis
    • ***
Webster's Revised Unabridged Dictionary
    • a Cryptographic Relating to cryptography; written in secret characters or in cipher, or with sympathetic ink.
    • ***
Century Dictionary and Cyclopedia
    • cryptographic Written in secret characters or in cipher: as, a cryptographic despatch.
    • cryptographic Designed or contrived for writing in secret characters: as, a cryptographic machine.
    • cryptographic In petrography, noting a fabric formed by the graphic intergrowth of two minerals, but so minute as not to be seen by the unaided eye.
    • ***

Usage

In literature:

Most of them are cryptographic abbreviations, not readily deciphered now.
"Mark Twain, A Biography, 1835-1910, Complete" by Albert Bigelow Paine
Let us see what 1804 will give us as a cryptographical number.
"Eight Hundred Leagues on the Amazon" by Jules Verne
My cryptograph won't depend on books.
"The Red Redmaynes" by Eden Phillpotts
But what of the rest of this monstrous cryptograph?
"A Journey to the Centre of the Earth" by Jules Verne
As it was, I assumed the cryptograph to be English.
"The Short-story" by William Patterson Atkinson
Isn't this what you call a cryptograph?
"The Paternoster Ruby" by Charles Edmonds Walk
As it was, I assumed the cryptograph to be English.
"International Short Stories" by Various
Then there was the matter of the NSA cryptographer who had been given an intercepted copy of the protocol.
"Project Daedalus" by Thomas Hoover
It is a cryptograph, but a simple one, familiar to school children.
"Nooks and Corners of Old New York" by Charles Hemstreet
Hence certain cryptographers have set to work and formed the theory of a hidden meaning in all this.
"The Great God Gold" by William Le Queux
***

In news:

This upgrade enables the Smart-Clone to clone specific automotive cryptographic transponders from Chrysler, Ford, Kia, Lexus, Mazda, Mitsubishi, Nissan, Subaru and Toyota.
Cryptographic Authentication IC Family Prevents Cloning, Secures Data.
The AT88SA family of lowest cost, ultra low power, super secure cryptographic authentication ICs.
However, being a novelty in the cryptographic world, its security has not been thoroughly studied.
Ever since Artur Ekert harnessed this phenomenon to distribute cryptographic keys in 1991, the field has bourgeoned.
In this chapter we will look at choosing and optimizing cryptographic algorithms, particularly for resource-constrained systems, such as embedded systems.
Suite B is the set of cryptographic algorithms recommended by the National Security Agency (NSA) to secure government communications.
Enterprises can't just store cryptographic hashes of user passwords and think they are protected, as attackers spend the time and resources to run them against dictionaries.
Attacks based on an implementation flaw of the Secure Sockets Layer (SSL) cryptographic protocol will be demonstrated on Friday by two security researchers.
The fact that the standard emerged from a country known more for its chocolate than for its software shows the international nature of the cryptographic field.
Until recently, Google, Yahoo, eBay and Amazon were using weak cryptographic signatures to digitally "sign" their own emails — and they still would be had a Florida mathematician not discovered the glaring security hole.
Unless you are a cryptographer, that is.
Biomedical researchers would benefit from emulating the logically rigorous reasoning of the late Alan Turing , British mathematician, computer scientist, and master cryptographer.
***

In science:

The channel capacity is observed to be minimum, that is 0, when fair coin is used by the cryptographers.
Statistical Analysis of Privacy and Anonymity Guarantees in Randomized Security Protocol Implementations
As the coin is made unfair, channel capacity rises and attains its maximum value which is close to log of the number of cryptographers when the coin is completely biased.
Statistical Analysis of Privacy and Anonymity Guarantees in Randomized Security Protocol Implementations
Most, if not all, of these schemes rely on the presence of one of the most fundamental cryptographic primitives, random number generation.
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
Many times cryptographic data, such as keys, are stored in RAM.
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
In many cases, traditional cryptographic solutions can not be used by RFID tags due to their low computational and memory capabilities.
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
***