gptkbp:instanceOf
|
gptkb:academic
|
gptkbp:etymology
|
from Greek 'kryptos' (hidden) and 'logos' (study)
|
gptkbp:hasApplication
|
gptkb:cryptocurrency
banking
e-commerce
digital signatures
data encryption
identity management
password protection
secure messaging
electronic voting
military communication
|
gptkbp:hasSubfield
|
gptkb:mathematics
computer science
|
https://www.w3.org/2000/01/rdf-schema#label
|
Cryptology
|
gptkbp:includes
|
crypt
cryptography
|
gptkbp:majorConference
|
gptkb:ASIACRYPT
gptkb:CHES
gptkb:CRYPTO
gptkb:EUROCRYPT
|
gptkbp:majorJournal
|
gptkb:Journal_of_Cryptology
gptkb:Designs,_Codes_and_Cryptography
|
gptkbp:notableEvent
|
gptkb:Enigma_code_breaking
creation of public key cryptography
development of RSA algorithm
|
gptkbp:notablePerson
|
gptkb:Adi_Shamir
gptkb:Alan_Turing
gptkb:Claude_Shannon
gptkb:Leonard_Adleman
gptkb:Martin_Hellman
gptkb:Ron_Rivest
gptkb:Whitfield_Diffie
gptkb:August_Kerckhoffs
|
gptkbp:organization
|
gptkb:International_Association_for_Cryptologic_Research
gptkb:Cryptology_Research_Society_of_India
|
gptkbp:relatedTo
|
cybersecurity
privacy
public key infrastructure
information security
hash functions
digital forensics
random number generation
symmetric-key cryptography
steganography
asymmetric-key cryptography
|
gptkbp:studies
|
authentication
information security
data integrity
secure communication
data confidentiality
non-repudiation
|
gptkbp:uses
|
gptkb:information_theory
gptkb:probability_theory
abstract algebra
number theory
combinatorics
computational complexity
mathematical algorithms
|
gptkbp:bfsParent
|
gptkb:25th_Air_Force
gptkb:CWI_Amsterdam
|
gptkbp:bfsLayer
|
6
|