Cryptographic

Some articles on cryptographic:

Skype Security - Implementation and Protocols - Cryptographic Primitives
... Skype uses standard cryptographic primitives to achieve its security goals ... The cryptographic primitives used in Skype are the AES block cipher, the RSA public-key cryptosystem, the ISO 9796-2 signature padding scheme, the SHA-1 hash function ...
Cryptographic Quarterly
... The Cryptographic Quarterly is an internal, classified journal of the U.S ... an index of articles published in their Cryptographic Quarterly journal ...
Cryptographic Tableau
... A cryptographic tableau is a construct of rows and columns with which one can encrypt and decrypt information ... The Vigenère cipher is a well-known example of a cryptographic scheme that uses a tableau ...
Cryptoki
... Standards (PKCS), published by RSA Laboratories, that defines a platform-independent API to cryptographic tokens, such as Hardware Security Modules (HSM) and smart cards ... the API "Cryptoki" which is an amalgamation of "cryptographic token interface" and is pronounced as "crypto-key", but "PKCS #11" is often used to refer to the API as well as the standard that defines it.) Since ... The PKCS #11 API defines most commonly used cryptographic object types (RSA keys, X.509 Certificates, DES/Triple DES keys, etc.) and all the functions ...
Lowell Frazer
... ("Jim") Frazer founded modern cryptographic evaluation for the US government ... cryptographic systems fielded prior to 1990 ... During this two-year tour, he performed assessments of many cryptographic systems, designed speech cryptosystems, and discovered an analytic technique that ...