When.com Web Search

  1. Ad

    related to: cryptography and communications journal articles related to psychology pdf

Search results

  1. Results From The WOW.Com Content Network
  2. Communication Theory of Secrecy Systems - Wikipedia

    en.wikipedia.org/wiki/Communication_Theory_of...

    "Communication Theory of Secrecy Systems" is a paper published in 1949 by Claude Shannon discussing cryptography from the viewpoint of information theory. [1] It is one of the foundational treatments (arguably the foundational treatment) of modern cryptography. [ 2 ]

  3. Cryptology ePrint Archive - Wikipedia

    en.wikipedia.org/wiki/Cryptology_ePrint_Archive

    The Cryptology ePrint Archive is an electronic archive of new results in the field of cryptography, maintained by the International Association for Cryptologic Research. It contains articles covering many of the most recent advances in cryptography, that did not necessarily undergo any refereeing process .

  4. List of preprint repositories - Wikipedia

    en.wikipedia.org/wiki/List_of_preprint_repositories

    Psychology, Neuroscience, Linguistics, Computer Science, Philosophy, and Biology >1,000 1997–2017 University of Southampton: CrimRxiv: Criminology: Criminology's open archive >100 2020 University of Manchester: Cryptology ePrint Archive: Cryptography: Open access preprint archive for cryptography >1,000 1996 International Association for ...

  5. Journal of Cryptology - Wikipedia

    en.wikipedia.org/wiki/Journal_of_Cryptology

    The Journal of Cryptology (ISSN 0933-2790) is a scientific journal in the field of cryptology and cryptography. The journal is published quarterly by the International Association for Cryptologic Research. Its editor-in-chief is Vincent Rijmen. [1]

  6. Password psychology - Wikipedia

    en.wikipedia.org/wiki/Password_psychology

    Research is being done to find new ways of enhancing and creating new techniques for cognitive ability and memorization when it comes to password selection. [5] A study from 2004 indicates that the typical college student creates about 4 different passwords for use with about 8 different items, such as computers, cell phones, and email accounts, and the typical password is used for about two ...

  7. Kerckhoffs's principle - Wikipedia

    en.wikipedia.org/wiki/Kerckhoffs's_principle

    Using secure cryptography is supposed to replace the difficult problem of keeping messages secure with a much more manageable one, keeping relatively small keys secure. A system that requires long-term secrecy for something as large and complex as the whole design of a cryptographic system obviously cannot achieve that goal.

  8. Chaotic cryptology - Wikipedia

    en.wikipedia.org/wiki/Chaotic_cryptology

    Cryptography refers to encrypting information for secure transmission, whereas cryptanalysis refers to decrypting and deciphering encoded encrypted messages. In order to use chaos theory efficiently in cryptography, the chaotic maps are implemented such that the entropy generated by the map can produce required Confusion and diffusion .

  9. Encyclopedia of Cryptography and Security - Wikipedia

    en.wikipedia.org/wiki/Encyclopedia_of...

    The Encyclopedia of Cryptography and Security is a comprehensive work on Cryptography for both information security professionals and experts in the fields of Computer Science, Applied Mathematics, Engineering, Information Theory, Data Encryption, etc. [1] It consists of 460 articles in alphabetical order and is available electronically and in print.