• WordNet 3.6
    • v cypher make a mathematical calculation or computation
    • v cypher convert ordinary language into code "We should encode the message for security reasons"
    • n cypher a message written in a secret code
    • n cypher a secret method of writing
    • n cypher a person of no influence
    • n cypher a quantity of no importance "it looked like nothing I had ever seen before","reduced to nil all the work we had done","we racked up a pathetic goose egg","it was all for naught","I didn't hear zilch about it"
    • n cypher a mathematical element that when added to another number yields the same number
    • ***
Webster's Revised Unabridged Dictionary
    • n. & v Cypher See Cipher.
    • ***
Century Dictionary and Cyclopedia
    • cypher See cipher.
    • ***


In literature:

The art of understanding writing in cypher, and the writing of words in a peculiar way.
"The Kama Sutra of Vatsyayana" by Vatsyayana
Perhaps you do not comprehend how this will in time reduce them, and consequently you to mere cyphers?
"The Justice and Necessity of Taxing the American Colonies, Demonstrated" by Unknown
Belle listened until one o'clock, writing down in cypher each plan.
"Legends of the Skyline Drive and the Great Valley of Virginia" by Carrie Hunter Willis
Paul handed his cypher-letter with trembling hands.
"Klytia" by George Taylor
He keeps these formal documents in his archives and all his clients use a cypher in the same way.
"The Laughing Cavalier" by Baroness Orczy
Bobby too was a cypher.
"A Bed of Roses" by W. L. George
Could he really crack a cypher with a 486 portable when NSA's Cray supercomputers had bombed?
"Project Daedalus" by Thomas Hoover
Upon the return to Dympsfield House, three telegrams in cypher were waiting for the King.
"Mrs. Fitz" by J. C. Snaith
Some were in cypher, but others he perused with the deepest interest.
"The Circassian Chief" by W.H.G. Kingston
He affixed to his works only the first syllable of his name, formed in a cypher.
"The History of Painting in Italy, Vol. 3 (of 6)" by Luigi Antonio Lanzi
Mr. Kesselbach, will you tell me the secret cypher that opens the lock?
"813" by Maurice Leblanc
With the Cyphers, Monograms, and particular marks, used by each master, accurately copied from the originals, and properly explained.
"A Catalogue of Books in English Later than 1700 (Vol 3 of 3)" by Various
I saw Smith, and told him plainly if Harry died, he should translate that cypher message to the Commander-in-Chief.
"A Song of a Single Note" by Amelia Edith Huddleston Barr
When I have once given my vote, from a political point of view, I am a squeezed out lemon, a cypher.
"Withered Leaves. Vol. I. (of III)" by Rudolf von Gottschall
But he had been a mere cypher there; and the worst of it was, that he had been conscious of being a cypher.
"A Charming Fellow, Volume I (of 3)" by Frances Eleanor Trollope
I picked up one handkerchief, still wet, it might be with tears, and on the corner of it was embroidered a royal cypher.
"Tales from Blackwood" by Various
They used a cypher to fix dates, etc., and published their notices in the newspapers, until repressive laws forbade this.
"When the Ku Klux Rode" by Eyre Damer
There is but one sign for the cypher of nothing and the circle of infinity.
"Flower, Fruit, and Thorn Pieces;" by Jean Paul Friedrich Richter
Few occupations are more detestable than poring over cypher, but total inaction is worse.
"A Prisoner in Turkey" by John Still
Why, the countess sent a cypher message to say that she had been entirely successful.
"The Weight of the Crown" by Fred M. White

In news:

Trophy Ridge's New Cypher Sight Series.
Trophy Ridge is showing a new line of Cypher sights this week at the Archery Trade Show.
Hip Hop Awards '12: The Ruff Ryders Cypher. Click LISTEN LIVE to stream now.
Hip Hop Awards '12: The Grand Hustle Cypher. Click LISTEN LIVE to stream now.
Hip Hop Awards '12: The West Coast Cypher. Click LISTEN LIVE to stream now.
Library 'Cypher' art brightens landscape.
INTERVIEWS See Eminem Murder the BET Hip Hop Awards' Best Cypher. October 12 2011, 11:33 AM ET by Marc Hogan.
An interview with Idris Hassan, the filmmaker of 'Bay Area Cypher: Freestyle Documentary.
Electronic keypads have been used to control access since the late 1950s, when the Cypher Lock was developed for United States government installations.
BET Hip-Hop Awards 2012: Chris Lighty Tribute, Cyphers & Winners.
Thizzler's Bay Area Freshmen 10 Cypher: Local Hip-Hop Tries To Get Its Game On.
Rick Ross, and many more performed either onstage or in the must-see cyphers.
Undoubtedly, the most exciting part of the 2012 BET Hip-Hop Awards are the cyphers.
The "West Coast" cypher boast established rappers Snoop Dogg and E-40, and newcomer Kendrick Lamar.

In science:

The sub-routine is built by hypercube simulation starting from either Cypher and Plaxton’s O(log n log log n) sorting algorithm for the nprocessor hypercube or from Leighton’s implementation on the n-processor hypercube of Batcher’s odd-even merge sort algorithm .
Online Permutation Routing in Partitioned Optical Passive Star Networks
So, as suggested in , we can replace the Leighton implementation of Batcher’s odd-even merge sort with Cypher and Plaxton’s routing algorithm for the hypercube, that is asymptotically faster (though slower for networks of practical size), since it runs in O(log n log log n) time .
Online Permutation Routing in Partitioned Optical Passive Star Networks
We remark that there is an interesting connection between our analysis of PRNG’s and cryptanalysis of stream and block cyphers.
Design Flaws in the Implementation of the Ziggurat and Monty Python methods (and some remarks on Matlab randn)
In cryptography, the There is yet another connection between PRNG’s and cyphers. designer would like the security of a cypher system not be dependent on its specific initialization by the user (e.g., with say counters or initial values (IV’s) increasing by one).
Design Flaws in the Implementation of the Ziggurat and Monty Python methods (and some remarks on Matlab randn)
Cypher. A lower bound on the size of Shellsort sorting networks.
Randomized Shellsort: A Simple Oblivious Sorting Algorithm
TLS protocol is another example in which cryptographically secure PRNGs are needed, during the generation of private key for symmetric cypher.
A novel pseudo-random number generator based on discrete chaotic iterations
Moreover, the sensitiveness conducts to the fact that, even if the attacker tries anyway to decrypt the cypher message by attempting to complete the part in his possession, he cannot succeed.
A novel pseudo-random number generator based on discrete chaotic iterations