id
stringlengths
4
8
url
stringlengths
32
188
title
stringlengths
2
122
text
stringlengths
143
226k
69076711
https://en.wikipedia.org/wiki/Deepak%20Gupta%20%28researcher%29
Deepak Gupta (researcher)
Deepak Gupta is an Indian researcher, software developer, and writer. He is known as an author and editor of handbooks such as the Handbook of Computer Networks and Cyber Security and the Handbook of Research on Multimedia Cyber Security. Education Gupta earned a Master of Science in Computer Forensics and Cyber Secur...
69095311
https://en.wikipedia.org/wiki/Ministry%20of%20Internal%20Affairs%20III
Ministry of Internal Affairs III
Department III of the Ministry of Internal Affairs (), also known as the State Security Department of the Ministry of Interior (), was the secret police of the Hungarian People's Republic after the State Protection Authority (AVH) was disbanded in 1956. The MIA III was called the AVH as a derogatory name due to the fo...
69122776
https://en.wikipedia.org/wiki/Vector%20overlay
Vector overlay
Vector overlay is an operation (or class of operations) in a geographic information system (GIS) for integrating two or more vector spatial data sets. Terms such as polygon overlay, map overlay, and topological overlay are often used synonymously, although they are not identical in the range of operations they include...
69167071
https://en.wikipedia.org/wiki/List%20of%20cryptosystems
List of cryptosystems
A cryptosystem is a set of cryptographic algorithms that map ciphertexts and plaintexts to each other. Private-key cryptosystems Private-key cryptosystems use the same key for encryption and decryption. Caesar cipher Substitution cipher Enigma machine Data Encryption Standard Twofish Serpent Camellia Salsa...
69197927
https://en.wikipedia.org/wiki/National%20Institute%20of%20Cryptology%20Research%20and%20Development
National Institute of Cryptology Research and Development
National Institute of Cryptology Research and Development (NICRD) is a national-level research center for cryptologic education and research. History The institute was established in 2007 at Hyderabad. It is one of the institutes which comes under the purview of National Technical Research Organisation. The other one...
69304107
https://en.wikipedia.org/wiki/Yandex.Cloud
Yandex.Cloud
Yandex.Cloud is a public cloud platform developed by the Russian internet company Yandex. Yandex.Cloud provides private and corporate users with infrastructure and computing resources in an ‘as a service’ format. History Yandex's plans to enter the public cloud market have been known since 2016, but the first news ab...
69611898
https://en.wikipedia.org/wiki/ChaCha20-Poly1305
ChaCha20-Poly1305
ChaCha20-Poly1305 is an Authenticated encryption with additional data (AEAD) algorithm, that combines the ChaCha20 stream cipher with the Poly1305 message authentication code. Its usage in IETF protocols is standardized in RFC 8439. It has fast software performance, and without hardware acceleration, is usually faster ...
69626669
https://en.wikipedia.org/wiki/Operation%20Rubicon%20%28Crypto%20AG%29
Operation Rubicon (Crypto AG)
Operation Rubicon (German: Operation Rubikon), until the late 1980s called Operation Thesaurus, was a secret operation by the West German Federal Intelligence Service (BND) and the U.S. Central Intelligence Agency (CIA), lasting from 1970 to 1993 and 2018, respectively, to gather communication intelligence of encrypted...
69633259
https://en.wikipedia.org/wiki/Hugo%20Krawczyk
Hugo Krawczyk
Hugo Krawczyk is an Argentine Israeli cryptographer best known for co-inventing the HMAC message authentication algorithm and contributing to the cryptographic architecture of many Internet standards, including IPsec, IKE, and SSL/TLS. Education Krawczyk acquired a Bachelor of Arts with a specialization in Mathematics...
69650917
https://en.wikipedia.org/wiki/L%C3%BCbsch%C3%BCtzer%20Teiche%20Stasi%20Bunker
Lübschützer Teiche Stasi Bunker
The Lübschützer Teiche Bunker Complex, built 1968–1972, was designed to be an emergency command centre for the District Administration for State Security, Leipzig (part of the Ministry for State Security, also known as the Stasi) in the event of war or a nuclear attack. It was never used for its intended purpose. Loca...
69746031
https://en.wikipedia.org/wiki/Kyber
Kyber
Kyber is a key encapsulation method (KEM) designed to be resistant to cryptanalytic attacks with future powerful quantum computers. It is used to establish a shared secret between two communicating parties without an (IND-CCA2) attacker in the transmission system being able to decrypt it. This asymmetric cryptosystem u...
69753744
https://en.wikipedia.org/wiki/Rod%20Jackson%20%28epidemiologist%29
Rod Jackson (epidemiologist)
Rodney Thornton Jackson (born 1954) is a New Zealand medically trained epidemiologist who has had lead roles in publicly-funded research focussing on systems to effectively identify risk factors in the epidemiology of chronic diseases, in particular cardiovascular diseases (CVDs). This involved linking large cohort stu...
69815015
https://en.wikipedia.org/wiki/Yara%20International%20School
Yara International School
Yara International School (YIS) (; ; ), is a K–12 gender-isolated English-medium multicultural international school in ad-Dirah, Riyadh, Saudi Arabia, located next to Qasr Al-Hukm Metro Station in the former premises of the Female Student Study Center of Imam Mohammad Ibn Saud Islamic University. Founded in 2003, it o...
69832740
https://en.wikipedia.org/wiki/Pufferfish2
Pufferfish2
Pufferfish2 is an adaptive, cache-hard password hashing function that attempts to improve upon bcrypt. Pufferfish2 uses a modified version of the Blowfish key setup, and improves some of the drawbacks of bcrypt's original Eksblowfish algorithm. Note: Pufferfish, like bcrypt, is not a key derivation function - it is a ...
69900061
https://en.wikipedia.org/wiki/Seny%20Kamara
Seny Kamara
Seny Kamara is a Senegalese-French-American computer scientist best known for his work on cryptography. He has delivered multiple congressional testimonies about the potential harms and opportunities with technology. He leads or co-leads numerous centers and activities focused on cryptography and social good. His work ...
69961974
https://en.wikipedia.org/wiki/Square%20%28payment%20system%29
Square (payment system)
Square is a payments system developed by Block, Inc. Square is a payments platform aimed at small and medium businesses that allows them to accept credit card payments and use tablet computers as payment registers for a point-of-sale system. History The original inspiration for Square occurred to Jack Dorsey in 2009 w...
70035770
https://en.wikipedia.org/wiki/CAESAR%20Competition
CAESAR Competition
The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) is a competition organized by a group of international cryptologic researcher to encourage the design of authenticated encryption schemes. The competition was announced at the Early Symmetric Crypto workshop in January 2013 a...
70087260
https://en.wikipedia.org/wiki/Ali%20Dehghantanha
Ali Dehghantanha
Ali Dehghantanha is an academic-entrepreneur in cybersecurity and cyber threat intelligence. He is an Associate Professor of Cybersecurity and a Canada Research Chair in Cybersecurity and Threat Intelligence. Dehghantanha is a pioneer in applying machine learning techniques toward cyber threat hunting, cyber threat in...
70149799
https://en.wikipedia.org/wiki/2022%20Russian%20invasion%20of%20Ukraine
2022 Russian invasion of Ukraine
On 24 February 2022, Russia launched a large-scale military invasion of Ukraine, one of its neighbours to the southwest, marking an escalation to a conflict that began in 2014. Following Ukraine's Revolution of Dignity in 2014, Russia had annexed Crimea and Russian-backed separatist forces had seized part of the Donbas...