from Wiktionary, Creative Commons Attribution/Share-Alike License
- adj. Relating to cryptography.
from the GNU version of the Collaborative International Dictionary of English
- adj. Relating to cryptography; written in secret characters or in cipher, or with sympathetic ink.
from The Century Dictionary and Cyclopedia
- Written in secret characters or in cipher: as, a cryptographic despatch.
- Designed or contrived for writing in secret characters: as, a cryptographic machine.
- In petrography, noting a fabric formed by the graphic intergrowth of two minerals, but so minute as not to be seen by the unaided eye.
from WordNet 3.0 Copyright 2006 by Princeton University. All rights reserved.
- adj. of or relating to cryptanalysis
Sorry, no etymologies found.
Freedom to Tinker is reporting that two groups have signifcantly damaged the current leaders in cryptographic hashes.
Well, those of you who know anything about cryptography know that it’s not only possible to encipher an informative text with a certain cryptographic key, but to embed information in the key itself.
His tasking would have continued as a technician assigned to maintain cryptographic machines which form a secure link in the Navy’s communications environment.
For years, I have said that the easiest way to break a cryptographic product is almost never by breaking the algorithm, that almost invariably there is a programming error that allows you to bypass the mathematics and break the product.
Distin as he wrote in a character that might have been called cryptographic, for it would have defied any one but the writer to have made it out.
Batman has a device called a cryptographic sequencer, which serves as an electronic puzzle solving tool Rogue's gallery: Several of Batman's most well-known villains appear in Arkham City, including Two-Face... ... and Catwoman, Batman's on-again off-again girlfriend/nemisis How're ya doin', Mr B?
On the topic of safely destroying data, what Thibadeau refers to as cryptographic erase, not only can self-encrypting hard drives make the process easier, it can make destroying data faster and also more cost-effective.
At the heart of the system is an algorithm that is used to compute a 128-character number known as a cryptographic hash from the digital information in a particular document.
The researchers 'solution is to create a publicly available digital fingerprint, known as a cryptographic hash mark, that will make it possible for anyone to determine that the documents are authentic and have not been tampered with.
It enables parts of the cryptographic key hierarchy to be managed by an external source such as Hardware Security Module (HSM), referred to as a cryptographic provider.