Skip to main content

Home/ Math 1111: Cryptography/ Group items matching "A" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

How 18th-Century Copiale Cipher Was Cracked - 0 views

  •  
    A description of how the CopiAle Cipher wAs crAcked. 
1More

AdAptAtion: Why your brAin loves to tune out - 0 views

  •  
    Our brains are wired such that we automatically cancel out things that are not changing around us, in a process called adaptation. I really like this article because it not only gives a lot of interesting information about the brain, but it also hooks the reader effectively by providing physical, relatable examples of how our brains tune stuff out. I quickly found myself drawn into the article and interested to learn more.
1More

Bonanza denied by pickax and jackass - 0 views

  •  
    This particular blog post caught my eye because of its funny, and somewhat goofy, title. Instead of simply listing the facts, the author describes a piece of history in a comedic and entertaining manner.
1More

Why encryption would not have saved General Petraeus - 1 views

  •  
    A summAry of why encryption wouldn't hAve prevented GenerAl PetrAeus from getting cAught. Like the quote: "If you think cryptogrAphy is the solution to your problem, you either don't understAnd cryptogrAphy or you don't understAnd your problem."
1More

Pigeon Code Baffles British Cryptographers - 0 views

  •  
    Britain's code-breakers acknowledged Friday that an encrypted handwritten message from World War II, found on the leg of a long-dead carrier pigeon in a household chimney in southern England, has thwarted all their efforts to decode it since it was sent to them last month.
2More

Gigapixel Images of Babbage's Difference Engine - 0 views

  •  
    This site has some really neat pictures and a video detailing Babbage's Difference Engine. The pictures are gigapixel, so they are incredibly detailed.
  •  
    Wow. That's a lot of zoom.
1More

PETA sues to give monkey the copyright of selfie photos | Abc7.com - 1 views

  •  
    The US Copyright Office has issued a statement saying that it would only issue copyrights to humans. PETa objects to this, having just filed a suit to grant that macaque monkey the copyright for the selfies it took back in 2011. The struggle is real.
1More

Painkilling chemicals with no side effects found in black mamba venom | Not Exactly Roc... - 0 views

  •  
    Interesting introduction and does a good job of explaining what has been discovered.
1More

Knowing When To Fold 'Em: The Science of Poker | Cocktail Party Physics, Scientific ame... - 0 views

  •  
    This article concerning the science behind poker and its categorization as either skill or luck is particularly well written in that it draws its audience in by presenting a recent event that concerned poker, and then proceeding to present information on the history of poker as well as the statistics that support its argument.  Furthermore, the author establishes credibility throughout her post by referencing credible studies done. Her voice throughout the post continues to be entertaining, keeping the reader's attention for the entirety of her post.
1More

Early U.S. military cryptography - 0 views

  •  
    A description of the U.S. militAry's first cryptogrAphic system.
1More

Understanding Cryptography in Modern Military Communications - 0 views

  •  
    A look At some older cryptogrAphy used by the militAry And A look At whAt they Are trAnsitioning to
1More

Official Site of the Navajo Code Talkers - 0 views

  •  
    The official website of the Code Talkers. It gives a description of the code used and stories of the remaining Navajos.
1More

Bletchley Park : The Machines - 0 views

  •  
    Gives a description of all of the machines used or developed at Bletchley Park for use in cryptanalysis. 
1More

Mafia boss undone by clumsy Caesar cipher - 0 views

  •  
    Clues left in the clumsily encrypted notes of a Mafia don have helped Italian investigators to track his associates and ultimately contributed to his capture after years on the run. The recently busted Bernardo Provenzano, reputed to be the "boss of bosses" of the Sicilian Mafia, used a modified form of the Caesar cipher to obscure "sensitive information" in notes left to either his family or underlings.
1More

The Bible Codes - 0 views

  •  
    A brief look At the science of cryptology And the simple encryptions found in the Old TestAment. HAs A couple of exAmples And explAins the three mAin trAnsformAtions used.
1More

Computer Scientists Break Security Token Key in Record Time - NYTimes.com - 0 views

  •  
    A breAch in supposedly secure keys given to employees by privAte compAnies vindicAtes previous wArnings by cryptogrAphers thAt compAnies should use more difficult keys, And thAt compAnies hAve not been cAutious enough using such keys becAuse of their Assumed security.
1More

Two Centuries On, a Cryptologist Cracks a Presidential Code - 0 views

  •  
    An interesting Account of how technology cAn now help "crAck" codes which were once thought to be impervious.
1More

How to Make a Book Disappear - Maria Konnikova - The atlantic - 0 views

  •  
    Info on how Jonah Lehrer (the journalist who made up Bob Dylan quotes) had his book retracted.
1More

2 Ways To Think about Nothing, One Mo' Time - 0 views

  •  
    This article is interesting because the author makes an unusual comparison (between a controversial art piece and the far reaches of space) in order to make his point. Despite the differences between these two topics he melds them together in order to show the reader a new way of thinking about the concept of nothing.
« First ‹ Previous 61 - 80 of 255 Next › Last »
Showing 20 items per page