Cryptographic Methods During the Mexican Revolution
نویسندگان
چکیده
This paper reviews an important period in the use of cryptographic methods in Mexican History, the Mexican Revolution from 1910–1916. As is the case in any civil war, there were many groups in conflict. Among several leaders in theMexican Revolution, it is worth mentioning Porfirio Dı́az, Francisco I. Madero and Venustiano Carranza. They represent three main groups which used characteristic cryptographic methods. In this paper, we describe some of the methods used by these groups during the Mexican Revolution.
منابع مشابه
Properties of Some Commercial Honeys Available in Mexican Market: Effect of Overheating on Quality of the Packaged Honey
Background: Honey is a natural product, but it can be adulterated or heat-treated, both of which damage the properties of the original product. This research was focused on the evaluation of quality parameters of some commercial honeys produced in México. Methods: Fifteen samples of commercial honeys available in Mexican market were collected. Some physicochemical parameters were determined, ...
متن کاملHow to Improve Speaking Skills in Plastic Surgery Training? Survey in Residents Participants in Pecha Kucha Contest
BACKGROUND Little is known about educational games in Plastic Surgery training. Pecha kucha game has proved to be helpful tool to improve communicative skills. This study survey in resident participants in Pecha Kucha contest assessed how to improve speaking skills in plastic surgery training. METHODS In the second edition of Pecha Kucha contest of the Mexican Society of Plastic Surgery, a s...
متن کاملPath dependence in development: Evidence from the Mexican Revolution∗
This study exploits within-state variation in drought severity to identify how insurgency during the Mexican Revolution, a major early 20th century armed conflict, impacted subsequent government policies and long-run economic development. Using a novel municipal-level dataset on revolutionary insurgency, the study documents that municipalities experiencing severe drought just prior to the Revol...
متن کاملInsurgency and Long-Run Development: Lessons from the Mexican Revolution∗
This study exploits within-state variation in drought severity to identify how insurgency during the Mexican Revolution, a major early 20th century armed conflict, impacted subsequent government policies and long-run economic development. Using a novel municipal-level dataset on revolutionary insurgency, the study documents that municipalities experiencing severe drought just prior to the Revol...
متن کاملDifferential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Cryptologia
دوره 33 شماره
صفحات -
تاریخ انتشار 2009