| 11. | Some antecedents of visual cryptography are in patents from the 1960s.
|
| 12. | It is for this reason that randomness is ubiquitous in cryptography.
|
| 13. | It can be added to the bottom of any cryptography article.
|
| 14. | He has worked on cryptography, in particular the XSL attack.
|
| 15. | It specifies two completely independent layers of cryptography to protect data.
|
| 16. | His research centers on the theory of cryptography and information security.
|
| 17. | These light sources are interesting for Quantum cryptography and Quantum computers.
|
| 18. | This is therefore on the frontier between classical and modern cryptography.
|
| 19. | Instead it should be used within the main cryptography navigation box.
|
| 20. | Usually blocks transactional hash chains are linked by Public Key Cryptography.
|