Search results

Jump to navigation Jump to search
  • ...ference software, Bitcoin Core. In 2008, Nakamoto published a paper on The Cryptography Mailing list at metzdowd.com describing the Bitcoin digital currency [https [[Category:Cryptography]]
    510 bytes (73 words) - 09:32, 13 January 2015
  • ...sity with a 30-year publishing history on cyber-security, surveillance and cryptography, and is an advocate of users' privacy, and the risks of embedding surveilla
    482 bytes (72 words) - 22:53, 20 April 2012
  • [[Series:Cryptography]]
    1,006 bytes (142 words) - 13:59, 3 December 2022
  • ...chnologies at the K.U.Leuven group COSIC (Computer Security and Industrial Cryptography). Her research is broadly focused on the topic of Privacy Enhancing Technol
    1 KB (156 words) - 12:36, 3 May 2012
  • ...rses''' is an FWO post-doctoral fellow at Computer Security and Industrial Cryptography (COSIC) in the Privacy Technologies Team at the Department of Electrical En
    3 KB (412 words) - 14:55, 5 December 2022
  • ...th specific questions of media culture (from copyright & music on the Net, cryptography & security, diasporic communities, "cooking pot markets" and the gift econo
    3 KB (474 words) - 19:18, 12 December 2022
  • ..., internet censorship, Big Tech, cloud computing, liberation technologies, cryptography, secure communication, deep-packet inspection
    10 KB (1,139 words) - 15:33, 15 April 2024
  • ...Cryptography.jpg|thumb|350px|Claude E. Shannon, ''A Mathematical Theory of Cryptography'', 1945. [http://archive.org/stream/ShannonMiscellaneousWritings#page/n181/ ...m/ShannonMiscellaneousWritings#page/n181/mode/2up A Mathematical Theory of Cryptography]'', Memorandum MM 45-110-02, Bell Laboratories, 1 September 1945, 114 pages
    28 KB (3,746 words) - 21:14, 27 October 2022
  • * cryptography, [http://monoskop.org/log/?tag=cryptography Log]
    85 KB (10,873 words) - 21:51, 21 April 2024