Back to Results
First PageMeta Content
Block cipher modes of operation / N-gram / Language model / One-time pad / Cryptanalysis / Substitution cipher / ICE / RC4 / Plaintext / Cryptography / Stream ciphers / Keystream


A Natural Language Approach to Automated Cryptanalysis of Two-time Pads Joshua Mason Kathryn Watkins
Add to Reading List

Document Date: 2006-09-28 16:26:57


Open Document

File Size: 242,37 KB

Share Result on Facebook

City

Ann Arbor / Dempster / Viking / New York / Washington / D.C. / Scribner / Alexandria / Reading / /

Company

Dell / AES / Enron / Google / CBC / Sun / C. John Wiley & Sons Inc. / Microsoft / /

Country

United States / /

Currency

pence / USD / /

/

Event

Layoffs / /

IndustryTerm

weighted cross-product / cross product / mobile communications / language processing community / search problem / dynamic programming algorithm / beam search / open source natural language processing / search-engine query / intelligence communications / oil futures / feasible solution / compressed document processing / singlesource shortest-path algorithm / natural language processing community / natural language processing / search results / feasible solutions / /

OperatingSystem

Linux / /

Organization

National Security Agency / National Science Foundation / Johns Hopkins University / Army’s Signal Intelligence Service / T13 Technical Committee / Technical Committee of Accredited Standards Committee INCITS / INCITS / Central Intelligence Agency / Association for Computational Linguistics Workshop / FSA / US Federal Reserve / Federal Energy Regulatory Commission / Pattern Analysis and Machine Intelligence / /

Person

Yoshi Kohno / Charles Wright / Jason Eisner Adam Stubblefield Johns / David Molnar / Kevin Fu / Gilbert Vernam / Fabian Monrose / Joshua Mason Kathryn Watkins Jason Eisner Adam / /

/

Position

Data Encryption General / editor / author / King / Spy Catcher / /

ProgrammingLanguage

Java / HTML / /

ProvinceOrState

Virginia / New York / Michigan / New Mexico / Manitoba / Massachusetts / /

PublishedMedium

IEEE Transactions on Pattern Analysis and Machine Intelligence / Cryptology ePrint Archive / /

RadioStation

100 Word / Word 2002 / /

Technology

speech recognition / RAM / Viterbi algorithm / Linux / API / Data Encryption / block cipher / HTML / EM algorithm / encryption / 2002 RC4 encryption / cryptography / natural language processing / Java / ASCII / singlesource shortest-path algorithm / dynamic programming algorithm / stream cipher / A* algorithms / /

URL

www.gutenberg.org/dirs / http /

SocialTag