Limpar
15 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo

Mark Stamp, Richard M. Low,

... 2.3.5 Purple versus Enigma . 2.4 Sigaba . 2.4.1 Sigaba Cipher Machine. 2.4.2 Sigaba Keyspace . 2.4.3 Sigaba Attack . 2.4.4 Sigaba Conclusion . 2.5 Summary . 2.6 Problems . 3. ...

Tópico(s): Cryptographic Implementations and Security

2007 - Association of College and Research Libraries | Choice Reviews Online

Artigo Acesso aberto Revisado por pares

Mark Stamp, Wing On Chan,

... this article, we consider an attack on the SIGABA cipher under the assumption that the largest practical ... The attack highlights various strengths and weaknesses of SIGABA and provides insight into the inherent level of ...

Tópico(s): Chaos-based Image/Signal Encryption

2007 - Taylor & Francis | Cryptologia

Artigo Acesso aberto

Muayad Sadik Croock, Zahraa Abbas Hassan, Saja Dhyaa Khudhur,

... security keys are generated using shift register and SIGABA technique. The proposed algorithm is tested over different ...

Tópico(s): Information and Cyber Security

2020 - Institute of Advanced Engineering and Science (IAES) | International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering

Artigo Revisado por pares

Crain Soudien,

... amehlo ezinguqukweni esezivelile emfundweni ephakeme odabeni lenguquko. Kulesi sigaba sohlaka lwe-atikili kubhekwa ezindabeni ezinkulu ezibhekana nohlelo ...

Tópico(s): Education Systems and Policy

2010 - Taylor & Francis | Discourse Studies in the Cultural Politics of Education

Artigo Revisado por pares

Louis Kruh,

Tópico(s): Software Engineering and Design Patterns

1985 - Taylor & Francis | Cryptologia

Artigo Revisado por pares

Kelly C. Chang, Richard M. Low, Mark Stamp,

... World War II: Germany used Enigma; America created Sigaba; Britain developed Typex. The breaking of Enigma by ...

Tópico(s): Chaos-based Image/Signal Encryption

2014 - Taylor & Francis | Cryptologia

Artigo Revisado por pares

Chris Christensen,

The cryptologic history of World War II is dominated by cipher machines. Much has been written about the Polish and British attacks on Enigma because those attacks succeeded. Much has been written ...

Tópico(s): Historical Geopolitical and Social Dynamics

2016 - Taylor & Francis | Cryptologia

Artigo Acesso aberto Revisado por pares

George Lasry,

Formulae display:?Mathematical formulae have been encoded as MathML and are displayed in this HTML version using MathJax in order to improve their display. Uncheck the box to turn MathJax off. This feature requires Javascript. Click on a formula to zoom.

Tópico(s): Intelligence, Security, War Strategy

2021 - Taylor & Francis | Cryptologia

Capítulo de livro

John F. Dooley,

... The Enigma, the Typex and the M-134C/SIGABA were the epitome of these machines and the ... construction of the Enigma and the M-134C/SIGABA.

Tópico(s): Cryptographic Implementations and Security

2013 - Springer Nature | SpringerBriefs in computer science

Artigo Revisado por pares

Robert Bagg,

... letters and poems. His daily watches at the SIGABA machine lasted eight hours, but there were slow ... still uses). Dozens of poems passed through his SIGABA machine and emerged on the page in its ...

Tópico(s): American Literature and Culture

2013 - Johns Hopkins University Press | ˜The œHopkins review/Hopkins review

Capítulo de livro

John F. Dooley,

... The EnigmaEnigma , the Typex and the M-134C/SIGABA were the epitome of these machines and the ... construction of the Enigma and the M-134C/SIGABA.

Tópico(s): Cryptographic Implementations and Security

2018 - | History of computing

Artigo

ROBERT BAGG,

... poems he composed in all caps on his sigaba code machine. Wilbur’s indignant and impolitic commentaries ...

Tópico(s): American Environmental and Regional History

2013 - Wiley | The Yale Review

Capítulo de livro

John F. Dooley,

... The Enigma, the Typex and the M-134C/SIGABA were the epitome of these machines and the ...

Tópico(s): History of Computing Technologies

2018 - | History of computing

Artigo Acesso aberto Revisado por pares

B. Dalton, Mark Stamp,

... The specific ciphers considered are Enigma, M-209, Sigaba, Purple, and Typex. We experiment with three classic ...

Tópico(s): Neural Networks and Applications

2024 - Taylor & Francis | Cryptologia

Artigo Acesso aberto Revisado por pares

S. M. Sigaba,

No abstract available.

Tópico(s): Migration, Identity, and Health

1972 - AOSIS | South African Journal of Physiotherapy