Cryptographic Modernization Program is a Department of Defense directed, NSA Information Assurance Directorate led effort to transform and modernize Information...
4 KB (455 words) - 19:21, 9 April 2023
B Cryptography was a set of cryptographic algorithms promulgated by the National Security Agency as part of its Cryptographic Modernization Program. It...
9 KB (929 words) - 15:23, 23 December 2024
High Assurance Internet Protocol Encryptor (category Cryptographic protocols)
Specification). The cryptography used is Suite A and Suite B, also specified by the NSA as part of the Cryptographic Modernization Program. HAIPE IS is based...
7 KB (763 words) - 00:42, 24 March 2025
is leading the Department of Defense Cryptographic Modernization Program, an effort to transform and modernize Information Assurance capabilities for...
26 KB (3,315 words) - 15:22, 1 January 2025
Alice and Bob (redirect from Characters in cryptography)
fictional characters commonly used as placeholders in discussions about cryptographic systems and protocols, and in other science and engineering literature...
24 KB (2,026 words) - 20:47, 18 June 2025
military radios to have software-programmable encryption under the National Security Agency’s (NSA) Cryptographic Modernization Initiative. Its frequency range...
6 KB (654 words) - 15:14, 1 June 2025
Japanese cryptology from the 1500s to Meiji (redirect from Cryptography in Japan)
transposition cipher much harder to explain. Second, the lack of a strong cryptographic tradition suggests – almost requires – a correspondingly weak cryptanalytic...
40 KB (6,156 words) - 13:12, 25 May 2025
TI-83 series (category Texas Instruments programmable calculators)
because of a bug in the standard compiler TI continued to rely on RSA cryptographic signing keys only 512 bits long for many years after it was known that...
17 KB (2,082 words) - 20:28, 27 May 2025
Concurrently, OFP updates added Automatic Ground Collision Avoidance System, cryptographic enhancements, and improved avionics stability, among others. A MIDS-JTRS...
196 KB (19,529 words) - 18:33, 28 June 2025
80/90 cryptographic radios. Marder 1 A1A2: A converted Marder 1 with A1 turret and A2 chassis Marder 1 A1A5: A Marder A1A2 with SEM 80/90 cryptographic radios...
41 KB (3,780 words) - 23:49, 24 June 2025
LibreSSL (category Cryptographic software)
response to the Heartbleed security vulnerability, with the goals of modernizing the codebase, improving security, and applying development best practices...
27 KB (2,291 words) - 21:24, 12 June 2025
for the first time in November 2001. A part of the system, a special cryptographic processor fitted into the weapons in 1997 had a potential Year 2000...
34 KB (3,892 words) - 16:16, 20 June 2025
Mathematical analysis (section Modernization)
Computational geometry Constraint satisfaction Constraint programming Computational logic Cryptography Information theory Statistics Discrete Computer algebra...
45 KB (4,391 words) - 07:02, 23 April 2025
and using Microsoft Bing for visual search "Flight Hub - Windows Insider Program". learn.microsoft.com. February 16, 2024. Retrieved May 31, 2024. "Announcing...
119 KB (4,075 words) - 08:39, 28 June 2025
published their paper, New Directions in Cryptography, introducing a radically new method of distributing cryptographic keys, which went far toward solving...
26 KB (2,206 words) - 15:56, 14 June 2025
K-129 underwent modernization under Project 629A at Dalzavod in Vladivostok, and re-entered service following completion of modernization on 30 May 1967...
42 KB (5,172 words) - 03:40, 24 June 2025
Publication (FIPS) NIST FIPS PUB 140-3 — Security Requirements for Cryptographic Modules. NIST FIPS PUB 199 — Standards for Security Categorization of...
10 KB (975 words) - 00:59, 18 June 2025
Information security (category Cryptography)
form by an authorized user who possesses the cryptographic key, through the process of decryption. Cryptography is used in information security to protect...
161 KB (18,145 words) - 15:47, 26 June 2025
mobile or cellular phone ICE (cipher), a block cipher in cryptography iCE (FPGA), a programmable logic device family by Lattice Semiconductor ICE validation...
8 KB (950 words) - 19:26, 14 June 2025
List of equipment of Polish Air Force List of ships of the Polish Navy Modernization of the Polish Armed Forces "Kompozytowe hełmy dla wojska". polska-zbrojna...
207 KB (6,186 words) - 05:52, 26 June 2025
conformance test suites, and methods for formal specification analysis and cryptographic protocol verification Co-author of the first formal definition of role-based...
25 KB (2,023 words) - 17:38, 23 June 2025
List of Nova episodes (category Nova (American TV program))
the programs in this list were not originally produced for PBS, but were acquired from other sources such as the BBC.[relevant?] All acquired programs are...
472 KB (2,491 words) - 02:48, 13 June 2025
of the organisation's Number One, devises a plot to steal a Lektor cryptographic device from the Soviets and sell it back to them while exacting revenge...
112 KB (8,545 words) - 01:34, 27 June 2025
from the original on 4 October 2020. Retrieved 18 November 2011. "DARPA Program Seeks to Use Brain Implants to Control Mental Illness – MIT Technology...
99 KB (4,149 words) - 14:05, 30 May 2025
scan, otherwise known as biometric data or (3) physical object such as cryptographic key or hard token. Specific security measures must also be implemented...
12 KB (1,414 words) - 09:04, 7 July 2024
security forces using "brute force, together with the breaking of the cryptographic code – probably with CIA know-how – … tracked down 4,121 party members...
65 KB (7,467 words) - 11:57, 26 June 2025
the only English-language optometry program in Canada; the French language Université de Montréal optometry program operates in Quebec. The school offers...
21 KB (2,225 words) - 22:52, 9 June 2025
emails carrying cryptographic signatures came via Google, which rigorously implements the technology. The analysts noted that cryptographic signatures can...
125 KB (12,262 words) - 23:18, 27 June 2025
People's Government of the People's Republic of China" (PDF). The Common Program of the People's Republic of China 1949-1954. Archived (PDF) from the original...
23 KB (1,954 words) - 04:44, 23 June 2025
cryptography using DigiDoc. Under Estonian law, since December 15, 2000 the cryptographic signature is legally equivalent to a manual signature. The Estonian...
194 KB (23,071 words) - 06:28, 27 June 2025