Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Thumbnail for Aerial refueling
    Aerial refueling, also referred to as air refueling, in-flight refueling (IFR), air-to-air refueling (AAR), and tanking, is the process of transferring...
    80 KB (9,833 words) - 00:47, 15 April 2024
  • Thumbnail for Cipher
    In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a...
    15 KB (2,044 words) - 16:54, 26 April 2024
  • Thumbnail for Color charge
    Color charge is a property of quarks and gluons that is related to the particles' strong interactions in the theory of quantum chromodynamics (QCD). Like...
    13 KB (1,722 words) - 18:48, 1 May 2024
  • ADO.NET is a data access technology from the Microsoft .NET Framework that provides communication between relational and non-relational systems through...
    6 KB (698 words) - 12:22, 17 January 2024
  • Thumbnail for Yabusame
    Yabusame (流鏑馬) is a type of mounted archery in traditional Japanese archery. An archer on a running horse shoots three special "turnip-headed" arrows successively...
    10 KB (1,406 words) - 02:31, 29 April 2024
  • Cultural selection theory is the study of cultural change modelled on theories of evolutionary biology. Cultural selection theory has so far never been...
    7 KB (913 words) - 10:44, 16 February 2024
  • Thumbnail for Power analysis
    Power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device. These attacks rely...
    11 KB (1,262 words) - 01:31, 8 August 2022
  • Thumbnail for .km
    .km is the Internet country code top-level domain (ccTLD) for Comoros. Registration is available directly at second-level or under a number of sub-domains...
    3 KB (197 words) - 17:31, 1 August 2022
  • The Non-Fossil Fuel Obligation (NFFO) refers to a collection of orders requiring the electricity distribution network operators in England and Wales to...
    4 KB (465 words) - 12:25, 9 September 2023
  • Mobile content is any type of web hypertext and information content and electronic media which is viewed or used on mobile phones, like text, sound, ringtones...
    17 KB (2,411 words) - 04:55, 7 December 2023
  • Thumbnail for RC6
    In cryptography, RC6 (Rivest cipher 6) is a symmetric key block cipher derived from RC5. It was designed by Ron Rivest, Matt Robshaw, Ray Sidney, and Yiqun...
    7 KB (714 words) - 23:39, 3 November 2023
  • Thumbnail for Tensegrity
    Tensegrity, tensional integrity or floating compression is a structural principle based on a system of isolated components under compression inside a network...
    38 KB (4,244 words) - 19:10, 1 May 2024
  • Energy switching services are companies that have come to exist since the EU began deregulating the gas and electricity markets, to open them to competition...
    3 KB (369 words) - 09:27, 9 March 2024
  • In cryptography, Khufu and Khafre are two block ciphers designed by Ralph Merkle in 1989 while working at Xerox's Palo Alto Research Center. Along with...
    8 KB (847 words) - 15:09, 26 January 2024
  • The slide attack is a form of cryptanalysis designed to deal with the prevailing idea that even weak ciphers can become very strong by increasing the number...
    7 KB (1,135 words) - 08:49, 25 July 2023
  • Thumbnail for Boomerang attack
    In cryptography, the boomerang attack is a method for the cryptanalysis of block ciphers based on differential cryptanalysis. The attack was published...
    9 KB (864 words) - 04:16, 17 October 2023
  • Thumbnail for Rotor machine
    In cryptography, a rotor machine is an electro-mechanical stream cipher device used for encrypting and decrypting messages. Rotor machines were the cryptographic...
    17 KB (2,460 words) - 12:53, 17 April 2024
  • In cryptography, New Data Seal (NDS) is a block cipher that was designed at IBM in 1975, based on the Lucifer algorithm that became DES. The cipher uses...
    3 KB (258 words) - 17:53, 3 July 2021
  • Thumbnail for Dicynodon
    Dicynodon ("two dog-teeth") is a genus of dicynodont therapsid that flourished during the Upper Permian period. Like all dicynodonts, it was an herbivorous...
    33 KB (519 words) - 01:24, 1 January 2024
  • Thumbnail for Westerhout 49
    In astronomy Westerhout 49 also known as W49, is a strong galactic thermal radio source characteristic of an HII region. It was discovered by Gart Westerhout...
    5 KB (563 words) - 16:00, 16 November 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)