Freedom to Tinker is reporting that two groups have signifcantly damaged the current leaders in cryptographic hashes. From Wordnik.com. [Boing Boing: August 15, 2004 - August 21, 2004 Archives] Reference
But I will not start explaining it by talking about all kind of cryptographic techniques used. From Wordnik.com. [Doom9's Forum] Reference
"cryptographic" before "snake oil," you seem to imply that the exact three-word phrase is the term of art that you are elaborating. From Wordnik.com. [Citizendium, the Citizens' Compendium - Recent changes [en]] Reference
And so on page after page of cryptographic memoranda. From Wordnik.com. [Mark Twain: A Biography] Reference
I see this all the time in good cryptographic designs. From Wordnik.com. [Security Matters: Lesson From the DNS Bug: Patching Isn't Enough] Reference
No cryptographic tokens are required for these operations to occur. From Wordnik.com. [Humboldt's False Alternative to Diebold] Reference
Battery: 1400 mAHr removable/rechargeable cryptographic lithium cell. From Wordnik.com. [Consumer Review: The Best Smartphones On The Market] Reference
Most of them are cryptographic abbreviations, not readily deciphered now. From Wordnik.com. [Mark Twain: A Biography] Reference
The greatest difficulty with cryptographic voting is lack of transparency. From Wordnik.com. [David Dill: Election Vaporware] Reference
The first is strong cryptographic protection for electronic communications. From Wordnik.com. [Testimony Concerning Computer Encryption And The "Clipper Chip" Before The U.S. House Of Representatives Subcommittee On Technology, Environment, And Aviation] Reference
Constitutional reasons which prevent the regulation of cryptographic software. From Wordnik.com. [Testimony On Encryption As Constitutionally Protected Speech] Reference
The intent was to impart a grandeur to the message, the oldest known cryptographic text. From Wordnik.com. [The Code Of The Future] Reference
That seemed like a solitary mission, but he soon found a cryptographic muse: Mary Fischer. From Wordnik.com. [HOW THEY BEAT BIG BROTHER] Reference
Thus, Clipper can be expected to provide strong cryptographic protection for several decades. From Wordnik.com. [Testimony Concerning Computer Encryption And The "Clipper Chip" Before The U.S. House Of Representatives Subcommittee On Technology, Environment, And Aviation] Reference
The book to its left is a copy of Johannes Trithemius '1518 Polygraphiae, a cryptographic landmark. From Wordnik.com. [the-inbetween.com] Reference
The book to its left is a copy of Johannes Trithemius' 1518 Polygraphiae, a cryptographic landmark. From Wordnik.com. [Browse the Artifacts of Geek History in Jay Walker's Library] Reference
From Atlantic City my father went to a former prep school north of New York, for cryptographic training. From Wordnik.com. [The Hotel New Hampshire]
There are cryptographic solutions to MITM attacks, and there are secure web protocols that implement them. From Wordnik.com. [How a Classic Man-in-the-Middle Attack Saved Colombian Hostages] Reference
I've previously called this sort of thing a cryptographic demolition derby: The last one left standing wins. From Wordnik.com. [America's Next Top Hash Function Begins] Reference
He had achieved this through the cryptographic technique of comparing its constituent variants: Fooaltiyeman. From Wordnik.com. [Boiling a Frog]
In 1995, researchers discovered they could recover cryptographic keys by comparing relative timings on chips. From Wordnik.com. [My Data, Your Machine] Reference
The cryptographic reasoning behind these two properties is subtle, but any cryptographic text talks about them. From Wordnik.com. [An American Idol for Crypto Geeks] Reference
They had some pretty sophisticated weaponry, cryptographic communications, satellites, cell phones, credit cards, false ID. From Wordnik.com. [CNN Transcript Dec 7, 2008] Reference
There are also cryptographic protocols that would enable a system of anonymity to further protect us from privacy violators. From Wordnik.com. [Technomania] Reference
The classification of cryptographic devices on the U.S. Munitions List hurts our ability to compete in the global marketplace. From Wordnik.com. [Speech Before The National Research Council - Committee To Study National Cryptography Policy] Reference
Nothing in the records had military value, but the cracking of a fiendishly clever cipher developed cryptographic capabilities. From Wordnik.com. [The Earth Book of Stormgate]
Forgive my using these words but, the plutocratic, cryptographic oligarchy (The OverLords) must be removed in any way possible. From Wordnik.com. [The War on Free Expression] Reference
What Ciphire Mail is doing in the background is automatically managing each user's set of public and private cryptographic keys. From Wordnik.com. [Safe E-Mailing for Dummies] Reference
The NSA's cryptographic mission is twofold: to maintain the security of government information and to gather foreign intelligence. From Wordnik.com. [HOW THEY BEAT BIG BROTHER] Reference
"There's no deep examination of cryptographic protocols to see whether the programmers made the best choices in terms of security.". From Wordnik.com. [E-Voting Tests Get Failing Grade] Reference
In addition, most countries, including several with major cryptographic resources and market size, are not represented at the OECD. From Wordnik.com. [Testimony Before The U.S. House Judiciary Committee Concerning The Security And Freedom Through Encryption (SAFE) Act] Reference
I would like to see research in cryptographic voting continue, and I hope that, someday, there will be practical results in that area. From Wordnik.com. [David Dill: Election Vaporware] Reference
Hackers wouldn\'t need to know passwords or cryptographic keys, or have access to any other part of the system, to do their dirty work. From Wordnik.com. [OpEdNews - Quicklink: Integrity of E-balloting system still in doubt] Reference
LearnThatWord and the Open Dictionary of English are programs by LearnThat Foundation, a 501(c)3 nonprofit.
Questions? Feedback? We want to hear from you!
Email us
or click here for instant support.
Copyright © 2005 and after - LearnThat Foundation. Patents pending.

