cryptography

(redirected from cryptology)
Also found in: Dictionary, Thesaurus, Acronyms, Encyclopedia, Wikipedia.
Related to cryptology: cryptozoology

cryptography

(krip-tog′ră-fē) [ crypt- + -graphy]
The science and techniques of concealing or disguising information through encoding and decoding. In the health professions cryptography is used to ensure the confidentiality of medical records.
References in periodicals archive ?
From the Civil War, when cryptologic personnel were called upon to protect the Navy's signals from unauthorized use, to World War II, when the use of cryptology helped alter the course of the war in the Pacific, the highly specialized skills of cryptologists were in high demand then and continue to be a valuable asset to the Navy.
Shacham (2002) Short signatures from the Weil pairing, Advances in Cryptology --AsiacryptS01, LNCS 2248, Springer, UK, pp.
What may be surprising to readers of Neal Stephenson's Cryptonomicon, however, is that the author makes that thread cryptology - the science (or, more accurately, dual sciences) of encoding messages to keep them secret and extracting secret messages from other people's communications.
A cryptology technician at the hospital for 19 years, she inspects, dyes and reports on 20 to 50 Pap smears a day.
Protecting Core Networking and Enterprise Data Protection at the National Research Institute of Electronics and Cryptology
The 8 partners (including 2 companies) are leading research teams in the area of applied cryptology with a strong track record of collaboration; it is complemented by 6 partner organisations from industry (including 2 SMEs).
Johnson brings significant industry knowledge of cyber intelligence and cryptology
Naval cryptology traces its history to the Civil War, when specially trained personnel intercepted and deciphered enemy signals and formulated ways to protect their own communications.
ElcomSoft and its officers are members of the Russian Cryptology Association and the Microsoft Business Connection program.
Currently, 20 ratings are live, including most recently those within the cryptology and construction force communities.
It will carry research, case studies, tutorials, and regular departments covering privacy concerns, legal and ethical issues, new tools and products, analysis of vulnerability, secure operating systems, cryptology and applications.
According to Foote's research, the technical knowledge that will prove most valuable for IT workers in the next two years includes remote and wireless access, authorization and authentication mechanisms, virtual private networks, and cryptology.