A New Method in Cryptography II
| dc.contributor.advisor | Walker, James S. | |
| dc.contributor.author | Christy, Jacqueline | |
| dc.date.accessioned | 2009-07-27T18:56:14Z | |
| dc.date.available | 2009-07-27T18:56:14Z | |
| dc.date.issued | 2009-07-27T18:56:14Z | |
| dc.description | Color poster with text and images (Spring 2009) | en |
| dc.description.abstract | When transferring data, it is important to encrypt the information with an algorithm that cannot be broken. One of the most frequent strategies used to decode messages is frequency analysis, so it is important the algorithm protects against these attempts at decryption. Formerly, an algorithm was devised, and now the bugs have been removed and its performance while encoding sets of alphanumerical data has been studied. | en |
| dc.description.sponsorship | University of Wisconsin--Eau Claire Office of Research and Sponsored Programs. | en |
| dc.identifier.uri | http://digital.library.wisc.edu/1793/35658 | |
| dc.language.iso | en_US | en |
| dc.relation.ispartofseries | USGZE AS589 | en |
| dc.subject | Coding theory | en |
| dc.subject | Cryptography--Statistical methods | en |
| dc.subject | Cryptography--Testing | en |
| dc.subject | Algorithms--Testing | en |
| dc.subject | Posters | en |
| dc.title | A New Method in Cryptography II | en |
| dc.type | Presentation | en |
Files
License bundle
1 - 1 of 1
Loading...
- Name:
- license.txt
- Size:
- 2.03 KB
- Format:
- Item-specific license agreed upon to submission
- Description: