Добірка наукової літератури з теми "Historical cryptology"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Historical cryptology".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Historical cryptology":

1

Christensen, Chris. "Review of the 2013 Cryptologic History Symposium,Technological Change and Cryptology: Meeting the Historical Challenge." Cryptologia 38, no. 3 (June 13, 2014): 276–81. http://dx.doi.org/10.1080/01611194.2014.915682.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Christensen, Chris. "Announcement of the 2013 Cryptologic History Symposium “Technological Change and Cryptology: Meeting the Historical Challenges” 17–18 October 2013." Cryptologia 37, no. 2 (April 3, 2013): 105–6. http://dx.doi.org/10.1080/01611194.2013.767671.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

McCarthy, Jerry. "Review of the 2nd International Conference on Historical Cryptology in Mons, Belgium." Cryptologia 44, no. 3 (September 27, 2019): 285–88. http://dx.doi.org/10.1080/01611194.2019.1659447.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Sun, Wen Jie. "Research on General Permutation Encryption Module Based on Chaos Theory." Applied Mechanics and Materials 686 (October 2014): 381–87. http://dx.doi.org/10.4028/www.scientific.net/amm.686.381.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modern cryptology. For example, in digital image encryption system, substitution can disrupt the original order of the images and eliminate the correlation of image information which not only can realize security of images, but also can resist intentional attack and destruction of clipping and noise. And transposition transformation is introduced into the design of block ciphers. The substitution has the feature of high efficiency and resistance, which makes it meet the specific requirements of encryption. So substitution cypher can be applied to modern encryption system.
5

Lehofer, Anna. "Decrypting Historical Ciphers - A Way of Mathematical Competence Development." Opus et Educatio 8, no. 2 (May 13, 2020). http://dx.doi.org/10.3311/ope.381.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In our rapidly transforming world, life long learning, the continuous development of key competences are becoming increasingly common phenomena. We can develop our or others' competences through various methodologies or contents. This paper presents historical examples from the discipline of historical cryptology to denote that classical cryptology is applicable to develop mathematical competences with.

Дисертації з теми "Historical cryptology":

1

Gambardella, Maria-Elena. "Cleartext detection and language identification in ciphers." Thesis, Uppsala universitet, Institutionen för lingvistik och filologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-446439.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In historical cryptology, cleartext represents text written in a known language ina cipher (a hand-written manuscript aiming at hiding the content of a message).Cleartext can give us an historical interpretation and contextualisation of themanuscript and could help researchers in cryptanalysis, but to these days thereis still no research on how to automatically detect cleartext and identifying itslanguage. In this paper, we investigate to what extent we can automaticallydistinguish cleartext from ciphertext in transcribed historical ciphers and towhat extent we are able to identify its language. We took a rule-based approachand run 7 different models using historical language models on ciphertextsprovided by the DECRYPT-Project. Our results show that using unigrams andbigrams on a word-level combined with 3-grams, 4-grams and 5-grams on acharacter-level is the best approach to tackle cleartext detection.

Книги з теми "Historical cryptology":

1

Galland, Joseph. An Historical and Analytical Bibliography of the Literature of Cryptology. Martino Publishing, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Galland, Joseph S. An Historical Bibliography of Cryptology to 1945 (Cryptographic Series , No 71). Aegean Park Pr, 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Galland, Joseph S. An Historical And Analytical Bibliography Of The Literature Of Cryptology (Cryptography). Galland Press, 2007.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Historical cryptology":

1

&, Cohen. "Mid-Atlantic." In America's Scientific Treasures, 64–163. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780197545508.003.0002.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The chapter “Mid-Atlantic” discusses scientific and technological sites of adult interest in Delaware, Maryland, New Jersey, New York, Pennsylvania, and Washington, DC, including the Johnson Victrola Museum, National Cryptologic Museum, the Sarnoff Collection, New York Botanical Garden, Joseph Priestley House, and Smithsonian Institution. The traveler is provided with essential information, including addresses, telephone numbers, hours of entry, handicapped access, dining facilities, dates open and closed, available public transportation, and websites. Nearly every site included here has been visited by the authors. Although written with scientists in mind, this book is for anyone who likes to travel and visit places of historical and scientific interest. Included are photographs of many sites within each state.

Тези доповідей конференцій з теми "Historical cryptology":

1

Eugen Antal and Pavol Zajac. "HCPortal Modules for Teaching and Promoting Cryptology." In 4th International Conference on Historical Cryptology HistoCrypt 2020. Linköping University Electronic Press, 2021. http://dx.doi.org/10.3384/ecp183151.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Grajek, Marek. "Dawn of Mathematical Cryptology: Probabilists vs Algebraists; Algebraists and Probabilists?" In 3rd International Conference on Historical Cryptology HistoCrypt 2020. Linköping University Electronic Press, 2020. http://dx.doi.org/10.3384/ecp2020171010.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Megyesi, Beáta. "Transcription of Historical Ciphers and Keys." In 3rd International Conference on Historical Cryptology HistoCrypt 2020. Linköping University Electronic Press, 2020. http://dx.doi.org/10.3384/ecp2020171014.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Jialuo Chen, Mohamed Ali Souibgui, Alicia Fornés, and Beáta Megyesi. "Unsupervised Alphabet Matching in Historical Encrypted Manuscript Images." In 4th International Conference on Historical Cryptology HistoCrypt 2020. Linköping University Electronic Press, 2021. http://dx.doi.org/10.3384/ecp183154.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Matthias Göggerle and Carola Dahlke. "3D Digitalization of historical cipher machines using computed tomography." In 4th International Conference on Historical Cryptology HistoCrypt 2020. Linköping University Electronic Press, 2021. http://dx.doi.org/10.3384/ecp183157.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Megyesi, Beáta. "Preface." In 3rd International Conference on Historical Cryptology HistoCrypt 2020. Linköping University Electronic Press, 2020. http://dx.doi.org/10.3384/ecp2020171001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Strasser, Gerhard F. "“Encoded“ Communication with Ladies in a Turkish Harem, 17th-Century Style." In 3rd International Conference on Historical Cryptology HistoCrypt 2020. Linköping University Electronic Press, 2020. http://dx.doi.org/10.3384/ecp2020171002.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Antal, Eugen, and Pavol Zajac. "HCPortal Overview." In 3rd International Conference on Historical Cryptology HistoCrypt 2020. Linköping University Electronic Press, 2020. http://dx.doi.org/10.3384/ecp2020171003.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Antal, Eugen, Pavol Zajac, and Otokar Grošek. "Diplomatic Ciphers Used by Slovak Attaché During the WW2." In 3rd International Conference on Historical Cryptology HistoCrypt 2020. Linköping University Electronic Press, 2020. http://dx.doi.org/10.3384/ecp2020171004.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Bean, Richard. "The Use of Project Gutenberg and Hexagram Statistics to Help Solve Famous Unsolved Ciphers." In 3rd International Conference on Historical Cryptology HistoCrypt 2020. Linköping University Electronic Press, 2020. http://dx.doi.org/10.3384/ecp2020171005.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

До бібліографії