• WordNet 3.6
    • v cypher make a mathematical calculation or computation
    • v cypher convert ordinary language into code "We should encode the message for security reasons"
    • n cypher a message written in a secret code
    • n cypher a secret method of writing
    • n cypher a person of no influence
    • n cypher a quantity of no importance "it looked like nothing I had ever seen before","reduced to nil all the work we had done","we racked up a pathetic goose egg","it was all for naught","I didn't hear zilch about it"
    • n cypher a mathematical element that when added to another number yields the same number
    • ***
Webster's Revised Unabridged Dictionary
    • n. & v Cypher See Cipher.
    • ***
Century Dictionary and Cyclopedia
    • cypher See cipher.
    • ***


In literature:

The art of understanding writing in cypher, and the writing of words in a peculiar way.
"The Kama Sutra of Vatsyayana" by Vatsyayana
Perhaps you do not comprehend how this will in time reduce them, and consequently you to mere cyphers?
"The Justice and Necessity of Taxing the American Colonies, Demonstrated" by Unknown
Belle listened until one o'clock, writing down in cypher each plan.
"Legends of the Skyline Drive and the Great Valley of Virginia" by Carrie Hunter Willis
Paul handed his cypher-letter with trembling hands.
"Klytia" by George Taylor
He keeps these formal documents in his archives and all his clients use a cypher in the same way.
"The Laughing Cavalier" by Baroness Orczy
Bobby too was a cypher.
"A Bed of Roses" by W. L. George
Could he really crack a cypher with a 486 portable when NSA's Cray supercomputers had bombed?
"Project Daedalus" by Thomas Hoover
Upon the return to Dympsfield House, three telegrams in cypher were waiting for the King.
"Mrs. Fitz" by J. C. Snaith
Some were in cypher, but others he perused with the deepest interest.
"The Circassian Chief" by W.H.G. Kingston
He affixed to his works only the first syllable of his name, formed in a cypher.
"The History of Painting in Italy, Vol. 3 (of 6)" by Luigi Antonio Lanzi

In news:

Trophy Ridge's New Cypher Sight Series.
Trophy Ridge is showing a new line of Cypher sights this week at the Archery Trade Show.
Hip Hop Awards '12: The Ruff Ryders Cypher. Click LISTEN LIVE to stream now.
Hip Hop Awards '12: The Grand Hustle Cypher. Click LISTEN LIVE to stream now.
Hip Hop Awards '12: The West Coast Cypher. Click LISTEN LIVE to stream now.
Library 'Cypher' art brightens landscape.
INTERVIEWS See Eminem Murder the BET Hip Hop Awards' Best Cypher. October 12 2011, 11:33 AM ET by Marc Hogan.
An interview with Idris Hassan, the filmmaker of 'Bay Area Cypher: Freestyle Documentary.
Electronic keypads have been used to control access since the late 1950s, when the Cypher Lock was developed for United States government installations.
BET Hip-Hop Awards 2012: Chris Lighty Tribute, Cyphers & Winners.
Thizzler's Bay Area Freshmen 10 Cypher: Local Hip-Hop Tries To Get Its Game On.
Rick Ross, and many more performed either onstage or in the must-see cyphers.
Undoubtedly, the most exciting part of the 2012 BET Hip-Hop Awards are the cyphers.
The "West Coast" cypher boast established rappers Snoop Dogg and E-40, and newcomer Kendrick Lamar.

In science:

The sub-routine is built by hypercube simulation starting from either Cypher and Plaxton’s O(log n log log n) sorting algorithm for the nprocessor hypercube or from Leighton’s implementation on the n-processor hypercube of Batcher’s odd-even merge sort algorithm .
Online Permutation Routing in Partitioned Optical Passive Star Networks
So, as suggested in , we can replace the Leighton implementation of Batcher’s odd-even merge sort with Cypher and Plaxton’s routing algorithm for the hypercube, that is asymptotically faster (though slower for networks of practical size), since it runs in O(log n log log n) time .
Online Permutation Routing in Partitioned Optical Passive Star Networks
We remark that there is an interesting connection between our analysis of PRNG’s and cryptanalysis of stream and block cyphers.
Design Flaws in the Implementation of the Ziggurat and Monty Python methods (and some remarks on Matlab randn)
In cryptography, the There is yet another connection between PRNG’s and cyphers. designer would like the security of a cypher system not be dependent on its specific initialization by the user (e.g., with say counters or initial values (IV’s) increasing by one).
Design Flaws in the Implementation of the Ziggurat and Monty Python methods (and some remarks on Matlab randn)
Cypher. A lower bound on the size of Shellsort sorting networks.
Randomized Shellsort: A Simple Oblivious Sorting Algorithm