id stringlengths 4 8 | url stringlengths 32 188 | title stringlengths 2 122 | text stringlengths 143 226k |
|---|---|---|---|
69076711 | https://en.wikipedia.org/wiki/Deepak%20Gupta%20%28researcher%29 | Deepak Gupta (researcher) | Deepak Gupta is an Indian researcher, software developer, and writer. He is known as an author and editor of handbooks such as the Handbook of Computer Networks and Cyber Security and the Handbook of Research on Multimedia Cyber Security.
Education
Gupta earned a Master of Science in Computer Forensics and Cyber Secur... |
69095311 | https://en.wikipedia.org/wiki/Ministry%20of%20Internal%20Affairs%20III | Ministry of Internal Affairs III | Department III of the Ministry of Internal Affairs (), also known as the State Security Department of the Ministry of Interior (), was the secret police of the Hungarian People's Republic after the State Protection Authority (AVH) was disbanded in 1956. The MIA III was called the AVH as a derogatory name due to the fo... |
69122776 | https://en.wikipedia.org/wiki/Vector%20overlay | Vector overlay | Vector overlay is an operation (or class of operations) in a geographic information system (GIS) for integrating two or more vector spatial data sets. Terms such as polygon overlay, map overlay, and topological overlay are often used synonymously, although they are not identical in the range of operations they include... |
69167071 | https://en.wikipedia.org/wiki/List%20of%20cryptosystems | List of cryptosystems | A cryptosystem is a set of cryptographic algorithms that map ciphertexts and plaintexts to each other.
Private-key cryptosystems
Private-key cryptosystems use the same key for encryption and decryption.
Caesar cipher
Substitution cipher
Enigma machine
Data Encryption Standard
Twofish
Serpent
Camellia
Salsa... |
69197927 | https://en.wikipedia.org/wiki/National%20Institute%20of%20Cryptology%20Research%20and%20Development | National Institute of Cryptology Research and Development | National Institute of Cryptology Research and Development (NICRD) is a national-level research center for cryptologic education and research.
History
The institute was established in 2007 at Hyderabad. It is one of the institutes which comes under the purview of National Technical Research Organisation. The other one... |
69304107 | https://en.wikipedia.org/wiki/Yandex.Cloud | Yandex.Cloud | Yandex.Cloud is a public cloud platform developed by the Russian internet company Yandex. Yandex.Cloud provides private and corporate users with infrastructure and computing resources in an ‘as a service’ format.
History
Yandex's plans to enter the public cloud market have been known since 2016, but the first news ab... |
69611898 | https://en.wikipedia.org/wiki/ChaCha20-Poly1305 | ChaCha20-Poly1305 | ChaCha20-Poly1305 is an Authenticated encryption with additional data (AEAD) algorithm, that combines the ChaCha20 stream cipher with the Poly1305 message authentication code. Its usage in IETF protocols is standardized in RFC 8439. It has fast software performance, and without hardware acceleration, is usually faster ... |
69626669 | https://en.wikipedia.org/wiki/Operation%20Rubicon%20%28Crypto%20AG%29 | Operation Rubicon (Crypto AG) | Operation Rubicon (German: Operation Rubikon), until the late 1980s called Operation Thesaurus, was a secret operation by the West German Federal Intelligence Service (BND) and the U.S. Central Intelligence Agency (CIA), lasting from 1970 to 1993 and 2018, respectively, to gather communication intelligence of encrypted... |
69633259 | https://en.wikipedia.org/wiki/Hugo%20Krawczyk | Hugo Krawczyk | Hugo Krawczyk is an Argentine Israeli cryptographer best known for co-inventing the HMAC message authentication algorithm and contributing to the cryptographic architecture of many Internet standards, including IPsec, IKE, and SSL/TLS.
Education
Krawczyk acquired a Bachelor of Arts with a specialization in Mathematics... |
69650917 | https://en.wikipedia.org/wiki/L%C3%BCbsch%C3%BCtzer%20Teiche%20Stasi%20Bunker | Lübschützer Teiche Stasi Bunker | The Lübschützer Teiche Bunker Complex, built 1968–1972, was designed to be an emergency command centre for the District Administration for State Security, Leipzig (part of the Ministry for State Security, also known as the Stasi) in the event of war or a nuclear attack. It was never used for its intended purpose.
Loca... |
69746031 | https://en.wikipedia.org/wiki/Kyber | Kyber | Kyber is a key encapsulation method (KEM) designed to be resistant to cryptanalytic attacks with future powerful quantum computers. It is used to establish a shared secret between two communicating parties without an (IND-CCA2) attacker in the transmission system being able to decrypt it. This asymmetric cryptosystem u... |
69753744 | https://en.wikipedia.org/wiki/Rod%20Jackson%20%28epidemiologist%29 | Rod Jackson (epidemiologist) | Rodney Thornton Jackson (born 1954) is a New Zealand medically trained epidemiologist who has had lead roles in publicly-funded research focussing on systems to effectively identify risk factors in the epidemiology of chronic diseases, in particular cardiovascular diseases (CVDs). This involved linking large cohort stu... |
69815015 | https://en.wikipedia.org/wiki/Yara%20International%20School | Yara International School | Yara International School (YIS) (; ; ), is a K–12 gender-isolated English-medium multicultural international school in ad-Dirah, Riyadh, Saudi Arabia, located next to Qasr Al-Hukm Metro Station in the former premises of the Female Student Study Center of Imam Mohammad Ibn Saud Islamic University.
Founded in 2003, it o... |
69832740 | https://en.wikipedia.org/wiki/Pufferfish2 | Pufferfish2 | Pufferfish2 is an adaptive, cache-hard password hashing function that attempts to improve upon bcrypt. Pufferfish2 uses a modified version of the Blowfish key setup, and improves some of the drawbacks of bcrypt's original Eksblowfish algorithm.
Note: Pufferfish, like bcrypt, is not a key derivation function - it is a ... |
69900061 | https://en.wikipedia.org/wiki/Seny%20Kamara | Seny Kamara | Seny Kamara is a Senegalese-French-American computer scientist best known for his work on cryptography. He has delivered multiple congressional testimonies about the potential harms and opportunities with technology. He leads or co-leads numerous centers and activities focused on cryptography and social good. His work ... |
69961974 | https://en.wikipedia.org/wiki/Square%20%28payment%20system%29 | Square (payment system) | Square is a payments system developed by Block, Inc. Square is a payments platform aimed at small and medium businesses that allows them to accept credit card payments and use tablet computers as payment registers for a point-of-sale system.
History
The original inspiration for Square occurred to Jack Dorsey in 2009 w... |
70035770 | https://en.wikipedia.org/wiki/CAESAR%20Competition | CAESAR Competition | The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) is a competition organized by a group of international cryptologic researcher to encourage the design of authenticated encryption schemes. The competition was announced at the Early Symmetric Crypto workshop in January 2013 a... |
70087260 | https://en.wikipedia.org/wiki/Ali%20Dehghantanha | Ali Dehghantanha | Ali Dehghantanha is an academic-entrepreneur in cybersecurity and cyber threat intelligence. He is an Associate Professor of Cybersecurity and a Canada Research Chair in Cybersecurity and Threat Intelligence.
Dehghantanha is a pioneer in applying machine learning techniques toward cyber threat hunting, cyber threat in... |
70149799 | https://en.wikipedia.org/wiki/2022%20Russian%20invasion%20of%20Ukraine | 2022 Russian invasion of Ukraine | On 24 February 2022, Russia launched a large-scale military invasion of Ukraine, one of its neighbours to the southwest, marking an escalation to a conflict that began in 2014. Following Ukraine's Revolution of Dignity in 2014, Russia had annexed Crimea and Russian-backed separatist forces had seized part of the Donbas... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.