• Cryptographic Modernization Program is a Department of Defense directed, NSA Information Assurance Directorate led effort to transform and modernize Information...
    4 KB (455 words) - 19:21, 9 April 2023
  • B Cryptography was a set of cryptographic algorithms promulgated by the National Security Agency as part of its Cryptographic Modernization Program. It...
    9 KB (929 words) - 15:23, 23 December 2024
  • High Assurance Internet Protocol Encryptor (category Cryptographic protocols)
    Specification). The cryptography used is Suite A and Suite B, also specified by the NSA as part of the Cryptographic Modernization Program. HAIPE IS is based...
    7 KB (763 words) - 00:42, 24 March 2025
  • is leading the Department of Defense Cryptographic Modernization Program, an effort to transform and modernize Information Assurance capabilities for...
    26 KB (3,315 words) - 15:22, 1 January 2025
  • Thumbnail for Alice and Bob
    fictional characters commonly used as placeholders in discussions about cryptographic systems and protocols, and in other science and engineering literature...
    24 KB (2,026 words) - 20:47, 18 June 2025
  • Thumbnail for AN/ARC-210
    military radios to have software-programmable encryption under the National Security Agency’s (NSA) Cryptographic Modernization Initiative. Its frequency range...
    6 KB (654 words) - 15:14, 1 June 2025
  • transposition cipher much harder to explain. Second, the lack of a strong cryptographic tradition suggests – almost requires – a correspondingly weak cryptanalytic...
    40 KB (6,156 words) - 13:12, 25 May 2025
  • Thumbnail for TI-83 series
    TI-83 series (category Texas Instruments programmable calculators)
    because of a bug in the standard compiler TI continued to rely on RSA cryptographic signing keys only 512 bits long for many years after it was known that...
    17 KB (2,082 words) - 20:28, 27 May 2025
  • Thumbnail for Lockheed Martin F-22 Raptor
    Concurrently, OFP updates added Automatic Ground Collision Avoidance System, cryptographic enhancements, and improved avionics stability, among others. A MIDS-JTRS...
    196 KB (19,529 words) - 18:33, 28 June 2025
  • Thumbnail for Marder (infantry fighting vehicle)
    80/90 cryptographic radios. Marder 1 A1A2: A converted Marder 1 with A1 turret and A2 chassis Marder 1 A1A5: A Marder A1A2 with SEM 80/90 cryptographic radios...
    41 KB (3,780 words) - 23:49, 24 June 2025
  • LibreSSL (category Cryptographic software)
    response to the Heartbleed security vulnerability, with the goals of modernizing the codebase, improving security, and applying development best practices...
    27 KB (2,291 words) - 21:24, 12 June 2025
  • Thumbnail for Permissive action link
    for the first time in November 2001. A part of the system, a special cryptographic processor fitted into the weapons in 1997 had a potential Year 2000...
    34 KB (3,892 words) - 16:16, 20 June 2025
  • Thumbnail for Mathematical analysis
    Computational geometry Constraint satisfaction Constraint programming Computational logic Cryptography Information theory Statistics Discrete Computer algebra...
    45 KB (4,391 words) - 07:02, 23 April 2025
  • and using Microsoft Bing for visual search "Flight Hub - Windows Insider Program". learn.microsoft.com. February 16, 2024. Retrieved May 31, 2024. "Announcing...
    119 KB (4,075 words) - 08:39, 28 June 2025
  • Thumbnail for Bobby Ray Inman
    published their paper, New Directions in Cryptography, introducing a radically new method of distributing cryptographic keys, which went far toward solving...
    26 KB (2,206 words) - 15:56, 14 June 2025
  • Thumbnail for Soviet submarine K-129 (1960)
    K-129 underwent modernization under Project 629A at Dalzavod in Vladivostok, and re-entered service following completion of modernization on 30 May 1967...
    42 KB (5,172 words) - 03:40, 24 June 2025
  • Publication (FIPS) NIST FIPS PUB 140-3 — Security Requirements for Cryptographic Modules. NIST FIPS PUB 199 — Standards for Security Categorization of...
    10 KB (975 words) - 00:59, 18 June 2025
  • Information security (category Cryptography)
    form by an authorized user who possesses the cryptographic key, through the process of decryption. Cryptography is used in information security to protect...
    161 KB (18,145 words) - 15:47, 26 June 2025
  • mobile or cellular phone ICE (cipher), a block cipher in cryptography iCE (FPGA), a programmable logic device family by Lattice Semiconductor ICE validation...
    8 KB (950 words) - 19:26, 14 June 2025
  • Thumbnail for List of equipment of the Polish Land Forces
    List of equipment of Polish Air Force List of ships of the Polish Navy Modernization of the Polish Armed Forces "Kompozytowe hełmy dla wojska". polska-zbrojna...
    207 KB (6,186 words) - 05:52, 26 June 2025
  • Thumbnail for D. Richard Kuhn
    conformance test suites, and methods for formal specification analysis and cryptographic protocol verification Co-author of the first formal definition of role-based...
    25 KB (2,023 words) - 17:38, 23 June 2025
  • List of Nova episodes (category Nova (American TV program))
    the programs in this list were not originally produced for PBS, but were acquired from other sources such as the BBC.[relevant?] All acquired programs are...
    472 KB (2,491 words) - 02:48, 13 June 2025
  • of the organisation's Number One, devises a plot to steal a Lektor cryptographic device from the Soviets and sell it back to them while exacting revenge...
    112 KB (8,545 words) - 01:34, 27 June 2025
  • from the original on 4 October 2020. Retrieved 18 November 2011. "DARPA Program Seeks to Use Brain Implants to Control Mental Illness – MIT Technology...
    99 KB (4,149 words) - 14:05, 30 May 2025
  • scan, otherwise known as biometric data or (3) physical object such as cryptographic key or hard token. Specific security measures must also be implemented...
    12 KB (1,414 words) - 09:04, 7 July 2024
  • security forces using "brute force, together with the breaking of the cryptographic code – probably with CIA know-how – … tracked down 4,121 party members...
    65 KB (7,467 words) - 11:57, 26 June 2025
  • the only English-language optometry program in Canada; the French language Université de Montréal optometry program operates in Quebec. The school offers...
    21 KB (2,225 words) - 22:52, 9 June 2025
  • Thumbnail for Hunter Biden laptop controversy
    emails carrying cryptographic signatures came via Google, which rigorously implements the technology. The analysts noted that cryptographic signatures can...
    125 KB (12,262 words) - 23:18, 27 June 2025
  • Thumbnail for Premier of China
    People's Government of the People's Republic of China" (PDF). The Common Program of the People's Republic of China 1949-1954. Archived (PDF) from the original...
    23 KB (1,954 words) - 04:44, 23 June 2025
  • Thumbnail for Identity document
    cryptography using DigiDoc. Under Estonian law, since December 15, 2000 the cryptographic signature is legally equivalent to a manual signature. The Estonian...
    194 KB (23,071 words) - 06:28, 27 June 2025