cryptology


Also found in: Dictionary, Thesaurus, Medical, Acronyms, Wikipedia.
Related to cryptology: cryptozoology

cryptology

[krip′täl·ə·jē]
(communications)
The science of preparing messages in forms which are intended to be unintelligible to those not privy to the secrets of the form, and of deciphering such messages.

cryptology

The study of cryptography and cryptanalysis.

cryptology

The science of developing secret codes and/or the use of those codes in encryption systems. See cryptography.
References in periodicals archive ?
[23] Dan Boneh and David Mandell Freeman, "Homomorphic signatures for polynomial functions," in Advances in Cryptology - Eurocrypt 2011, LNCS 6632, pp.
Gong, "Revisiting MAC forgeries, weak keys and provable security of Galois/counter mode of operation," in Cryptology and network security, vol.
Cheon, "Discrete logarithm problems with auxiliary inputs," Journal of Cryptology, vol.
The main problem with learning cryptology is its complexity and its foundation on complex mathematical principles and formulae.
Waters, "Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption," in Advances in Cryptology: EUROCRYPT 2010, vol.
Segev, "Function-Private Subspace-Membership Encryption and Its Applications, Cryptology ePrint Archive," Report 2013/403, 2013, http://eprint .iacr.org/2013/403.
In her book, titled "Utanc Duyuyorum-Hrant Dink Cinayeti'nin Yargysy" (I am ashamed -- Trial of Hrant Dink's Murder), Ecetin says she received a phone call on March 16, 2010, from a man who called himself "Ramazan" and said he works as a cryptology expert at MyT's East Anatolia regional office.
* A cryptology accelerator and sophisticated tamper detection.
Stevens, who is a scientific staff member in the cryptology group at CWI, analysed the rogue Microsoft certificate used by Flame's authors and determined that they used a different MD5 collision attack than the one devised by him and his colleagues in 2008.
In this book, he discovers cryptology, examines tattoos, and learns to play the violin.
The centre will also be designed to enhance research capability in specified cyber technology areas, including networking security, mobility security, cryptology, forensics and embedded devices such as industrial control systems.