| 21. | Non-signaling adversaries have recently been considered in quantum cryptography.
|
| 22. | Finding such a way would be a major contribution to cryptography.
|
| 23. | In Iran, a license is still required to use cryptography.
|
| 24. | It became of practical importance with the advent of modern cryptography.
|
| 25. | Also included are access control, identity management, and cryptography.
|
| 26. | In cryptography, the instability of the transformed Mojette secures data.
|
| 27. | Perhaps someone might think it a useful alternative to cryptography.
|
| 28. | The Minneapolis company was doing contract work for the Navy in cryptography.
|
| 29. | After all, the point of cryptography is to keep a secret.
|
| 30. | Schneier is the author of a standard textbook on cryptography.
|