Index of cryptography articles

From Wikipedia, the free encyclopedia

Articles related to cryptography include:

A

B

C

C2NetC-36 (cipher machine)C-52 (cipher machine)Caesar cipherCamellia (cipher)CAPICOMCapstone (cryptography)Cardan grilleCard catalog (cryptology)Carlisle AdamsCAST-128CAST-256Cayley–Purser algorithmCBC-MACCCM modeCCMPCD-57CDMFCellular Message Encryption AlgorithmCentibanCentral Security ServiceCentre for Applied Cryptographic ResearchCentral BureauCerticomCertificate authorityCertificate-based encryptionCertificateless cryptographyCertificate revocation listCertificate signing requestCertification path validation algorithmChaffing and winnowingChallenge-Handshake Authentication ProtocolChallenge–response authenticationChosen-ciphertext attackChosen-plaintext attackCIKS-1Cipher diskCipher runesCipher security summaryCipherSaberCiphertext expansionCiphertext indistinguishabilityCiphertext-only attackCiphertext stealingCIPHERUNICORN-ACIPHERUNICORN-EClassical cipherClaude ShannonClaw-free permutationCleartextCLEFIAClifford CocksClipper chipClock (cryptography)Clock driftCMVPCOCONUT98CodebookCode (cryptography)Code talkerCodress messageCold boot attackCollision attackCollision resistanceColossus computerCombined Cipher MachineCommitment schemeCommon Scrambling AlgorithmCommunications securityCommunications Security EstablishmentCommunication Theory of Secrecy SystemsComparison of disk encryption softwareComparison of SSH clientsCompleteness (cryptography)Complexity trapComputational Diffie–Hellman assumptionComputational hardness assumptionComputer insecurityComputer and network surveillanceCOMSEC equipmentConch (SSH)Concrete securityConel Hugh O'Donel AlexanderConfidentialityConfusion and diffusionContent Scramble SystemControlled Cryptographic ItemCorkscrew (program)Correlation immunityCOSICCovert channelCover (telecommunications)Crab (cipher)Cramer–Shoup cryptosystemCRAM-MD5CRHFCrib (cryptanalysis)Crowds (anonymity network)Crypt (C)CryptanalysisCryptanalysis of the EnigmaCryptanalysis of the Lorenz cipherCryptanalytic computerCryptexCrypticoCrypto AGCrypto-anarchismCrypto API (Linux)Microsoft CryptoAPICryptoBuddyCryptochannelCRYPTO (conference)CryptogramCryptographically Generated AddressCryptographically secure pseudorandom number generatorCryptographically strongCryptographic Application Programming InterfaceCryptographic hash functionCryptographic key typesCryptographic Message SyntaxCryptographic primitiveCryptographic protocolCryptographic Service ProviderCryptographie indéchiffrableCryptographyCryptography in JapanCryptography newsgroupsCryptography standardsCrypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital AgeCryptologiaCryptology ePrint ArchiveCryptology Research Society of IndiaCryptomathicCryptomeCryptomeria cipherCryptonomiconCrypToolCrypto-societyCryptosystemCryptovirologyCRYPTRECCS-CipherCurve25519Cycles per byteCyclometerCypherpunkCyrillic Projector

D

D'Agapeyeff cipherDaniel J. BernsteinData Authentication AlgorithmData Encryption StandardDatagram Transport Layer SecurityDavid ChaumDavid KahnDavid NaccacheDavid WagnerDavid Wheeler (computer scientist)Davies attackDavies–Meyer hashDEALDeciphermentDecisional Diffie–Hellman assumptionDecorrelation theoryDecryptDeCSSDefence Signals DirectorateDegree of anonymityDelegated Path DiscoveryDelegated Path ValidationDeniable encryptionDerek TauntDerived unique key per transactionDES ChallengesDES supplementary materialDES-XDeterministic encryptionDFC (cipher)Dictionary attackDifferential cryptanalysisDifferential-linear attackDifferential power analysisDiffie–Hellman key exchangeDiffie–Hellman problemDigiCipher 2Digital FortressDigital rights managementDigital signatureDigital Signature AlgorithmDigital signature forgeryDigital timestampingDigital watermarkingDilly KnoxDining cryptographers problemDiplomatic bagDirect Anonymous AttestationDiscrete logarithmDisk encryptionDisk encryption hardwareDisk encryption softwareDistance-bounding protocolDistinguishing attackDistributed.netDMA attackdm-cryptDmitry SklyarovDomainKeysDon CoppersmithDorabella CipherDouble Ratchet AlgorithmDoug StinsonDragon (cipher)DRYADDual_EC_DRBG

E

F

G

H

I

J

K

L

M

N

O

P

Padding (cryptography)Padding oracle attackPaillier cryptosystemPairing-based cryptographyPanama (cryptography)Partitioning cryptanalysisPassive attackPassphrasePasswordPassword-authenticated key agreementPassword crackingPassword Hashing CompetitionPaul KocherPaulo PancatuccioPaulo S. L. M. BarretoPaul van OorschotPBKDF2PC BrunoPepper (cryptography)Perfect forward secrecyPerforated sheetsPermutation cipherPeter Gutmann (computer scientist)Peter JungerPeter TwinnPGP CorporationPGPDiskPGPfonePhelixPhil ZimmermannPhoturis (protocol)Physical securityPhysical unclonable functionPig LatinPigpen cipherPike (cipher)Piling-up lemmaPinwheel (cryptography)Piotr SmoleńskiPirate decryptionPKC (conference)PKCSPKCS 11PKCS 12PKIXPlaintextPlaintext-aware encryptionPlayfair cipherPlugboardPMAC (cryptography)Poem codePohlig–Hellman algorithmPoint-to-Point Tunneling ProtocolPointcheval–Stern signature algorithmPoly1305Polyalphabetic cipherPolybius squarePost-quantum cryptographyPost-Quantum Cryptography StandardizationPower analysisPreimage attackPre-shared keyPretty Good PrivacyPrinter steganographyPrivacy-enhanced Electronic MailPrivate Communications TechnologyPrivate information retrievalProbabilistic encryptionProduct cipherProof-of-work systemProtected Extensible Authentication ProtocolProvable securityProvably secure cryptographic hash functionProxy re-encryptionPseudo-Hadamard transformPseudonymityPseudorandom functionPseudorandom number generatorPseudorandom permutationPublic key certificatePublic-key cryptographyPublic key fingerprintPublic key infrastructurePURPLEPuTTYPy (cipher)

Q

R

Rabbit (cipher)Rabin cryptosystemRabin signatureRadioGatúnRail fence cipherRainbow tableRalph MerkleRambutan (cryptography)Random functionRandomness testsRandom number generator attackRandom oracleRC2RC4RC5RC6Rebound attackReciprocal cipherRed/black conceptREDOCRed Pike (cipher)Reflector (cipher machine)Regulation of Investigatory Powers Act 2000ReihenschieberRekeying (cryptography)Related-key attackReplay attackReservehandverfahrenResidual block terminationRijndael key scheduleRijndael S-boxRing signatureRIPEMDRip van Winkle cipherRobert Morris (cryptographer)RockexRolf NoskwithRon RivestRoom 40Root certificateRoss J. AndersonRossignolsROT13Rotor machineRSA RSARSA-100RSA-1024RSA-110RSA-120RSA-129RSA-130RSA-140RSA-150RSA-1536RSA-155RSA-160RSA-170RSA-180RSA-190RSA-200RSA-2048RSA-210RSA-220RSA-230RSA-232RSA-240RSA-250RSA-260RSA-270RSA-280RSA-290RSA-300RSA-309RSA-310RSA-320RSA-330RSA-340RSA-350RSA-360RSA-370RSA-380RSA-390RSA-400RSA-410RSA-420RSA-430RSA-440RSA-450RSA-460RSA-470RSA-480RSA-490RSA-500RSA-576RSA-617RSA-640RSA-704RSA-768RSA-896RSA-PSSRSA Factoring ChallengeRSA problemRSA Secret-Key ChallengeRSA SecurityRubber-hose cryptanalysisRunning key cipherRussian copulation

S

S-1 block cipherSAFERSalsa20Salt (cryptography)SAM cardSecurity Support Provider InterfaceSAMLSAVILLESC2000Schnorr groupSchnorr signatureSchoof–Elkies–Atkin algorithmSCIPScott VanstoneScramblerScramdiskScream (cipher)ScryptScytaleSeahorse (software)SEAL (cipher)Sean Murphy (cryptographer)SECGSecret broadcastSecret decoder ringSecrets and Lies (Schneier)Secret sharingSectéra Secure ModuleSecure access moduleSecure channelSecure Communication based on Quantum CryptographySecure copySecure cryptoprocessorSecure Electronic TransactionSecure Hash AlgorithmsSecure Hypertext Transfer ProtocolSecure key issuing cryptographySecure multi-party computationSecure Neighbor DiscoverySecure Real-time Transport ProtocolSecure remote password protocolSecure ShellSecure telephoneSecure Terminal EquipmentSecure voiceSecurIDSecurity associationSecurity engineeringSecurity levelSecurity parameterSecurity protocol notationSecurity through obscuritySecurity tokenSEEDSelected Areas in CryptographySelf-certifying File SystemSelf-shrinking generatorSelf-signed certificateSemantic securitySerge VaudenaySerpent (cipher)Session keySHACALShafi GoldwasserSHA-1SHA-2SHA-3Shared secretSHARKShaun WylieShor's algorithmShrinking generatorShugborough inscriptionSide-channel attackSiemens and Halske T52SIGABASIGCUMSIGINTSignal ProtocolSignal Intelligence ServiceSigncryptionSIGSALYSILC (protocol)Silvio MicaliSimple Authentication and Security LayerSimple public-key infrastructureSimple XOR cipherS/KEYSkein (hash function)Skipjack (cipher)Slide attackSlidexSmall subgroup confinement attackS/MIMESM4 algorithm (formerly SMS4) • Snake oil (cryptography)SnefruSNOWSnuffleSOBER-128Solitaire (cipher)Solomon KullbackSOSEMANUKSpecial Collection ServiceSpectr-H64SPEKE (cryptography)Sponge functionSPNEGOSquare (cipher)Ssh-agentSSLeayStafford TavaresStandard model (cryptography)Station CASTStation HYPOStation-to-Station protocolStatistical cryptanalysisStefan LucksSteganalysisSteganographyStraddling checkerboardStream cipherStream cipher attacksStrong cryptographyStrong RSA assumptionStuart Milner-BarrySTU-IISTU-IIIStunnelSubstitution boxSubstitution cipherSubstitution–permutation networkSuperencryptionSupersingular isogeny key exchangeSwedish National Defence Radio EstablishmentSWIFFTSXAL/MBALSymmetric-key algorithmSYSKEY

T

U

V

W

X

X.509XDH assumptionXiaoyun WangXML EncryptionXML SignaturexmxXSL attackXTEAXTRXuejia LaiXXTEA 10-00-00-00-00

Y

Z

See also

Related Articles

Wikiwand AI