First  |  Prev |  Next  |  Last
Pages: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
On potential modern day usage of homophones
[Addendum] One could also treat in a similar way homophones of digrams or even trigrams. The space of trigram is 26^3=17576. Since 2^16=65536, a homophone mapping of trigrams to 16 bits could presumably be fairly satisfactorily done. However, the large table size 2^16 is obviously a substantial disadvantage. A conc... 14 Jul 2010 18:44
The Huge Significance of the Vigenere Cipher in modern Cryptography.
On 07/14/10 10:49, adacrypt wrote: I am open to correction here if I am wrong but please explain - cheers - adacrypt You ARE wrong. The reasons why have been explained to you /ad nauseam/. What reason exists that explaining it yet again will make one iota of difference? M -- ... 15 Jul 2010 14:18
Hah! BulletProof has a bug
I emailed BulletProof and told them of their bug. I guess they've corrected it with a new version. fb ... 14 Jul 2010 04:26
Dutch clearly robbed of victory by not giving a crucial/obviouscorner near the end of the match, putting the defense offguard resulting ina counter-goal.
["Followup-To:" header set to sci.crypt.] On 2010-07-13, Skybuck Flying <IntoTheFuture(a)hotmail.com> wrote: I do not believe Spain is better. They had many chances and scored none... proving the defence of the Netherlands was adequate. The Netherlands also had many chances and scored none. Spain was luc... 13 Jul 2010 18:38
Dutch clearly robbed of victory by not giving a crucial/obvious corner near the end of the match, putting the defense offguard resulting in a counter-goal.
Amazing only one video on youtube shows what happens and how the dutch were cheated: http://www.youtube.com/watch?v=Ckcg-JSlYJI The fear around the world for the FIFA and other copyright owners appears to be big. Bye, Skybuck. ... 14 Jul 2010 06:36
The Huge Significance of the Vigenere Cipher in modern Cryptography.
The Huge Significance of the Vigenere Cipher in modern Cryptography. Up until the advent of computer-driven number-theoretic cryptography in about 1970 all cryptography was either transpositional or substitutional in concept – this made it one-dimension in effect in that it could be modelled on an imaginary strai... 15 Jul 2010 13:12
Polymorphic Code Protection
can someone explain what is polymorphic algorithm of JavaScript code protection? Webpage Encryption Based on Polymorphic Javascript Algorithm http://doi.ieeecomputersociety.org/10.1109/IAS.2009.39 Polymorphic Algorithm of JavaScript Code Protection http://doi.ieeecomputersociety.org/10.1109/ISCSCT.2008.48 c... 11 Jul 2010 14:51
How secure is one's computer?
The race between producers of malware and producers of anti-malware is well-known. It is IMHO natural to assume that the former, being the 'active' partner, have some advantages in this race and so the computer of an average user has always a very real chance of being infected without detection, no matter how muc... 11 Aug 2010 12:33
Chosen plain text attack on Chaocipher
In this type of attack we: 1) Choose a plaintext 2) Submit the plaintext for encipherment 3) Get back the ciphertext Our task is to recover the unknown key (that is, the initial settings on both wheels). How well does Chaocipher perform under this type of attack ? Before we begin our attack, let's see what... 11 Jul 2010 05:04
Mutual Databases.
This technology is relatively easy to understand. Just simply create a computer program that encrypts your plaintext according to some algorithm. Then immediately create another program as a continuation of the first that decrypts it perfectly. Anything you encipher on your computer can now be deciphered in you ... 11 Jul 2010 15:58
First  |  Prev |  Next  |  Last
Pages: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15