Index of cryptography articles
Articles related to cryptography include:
A
A5/1 • A5/2 • ABA digital signature guidelines • ABC (stream cipher) • Abraham Sinkov • Acoustic cryptanalysis • Adaptive chosen-ciphertext attack •
• Advantage (cryptography) • ADFGVX cipher • Adi Shamir • Advanced Access Content System • Advanced Encryption Standard • Advanced Encryption Standard process • Adversary • • Affine cipher • Agnes Meyer Driscoll •B
B-Dienst • Babington Plot • Baby-step giant-step • Bacon's cipher • Banburismus • Bart Preneel • BaseKing • BassOmatic • BATON • BB84 • Beale ciphers • BEAR and LION ciphers • Beaufort cipher • Beaumanor Hall • Bent function • Berlekamp–Massey algorithm • Bernstein v. United States • BestCrypt • Biclique attack • BID/60 • BID 770 • Bifid cipher • Bill Weisband • Binary Goppa code •
• Birthday attack • Bit-flipping attack • BitTorrent protocol encryption •C
C2Net • C-36 (cipher machine) • C-52 (cipher machine) • Caesar cipher • Camellia (cipher) • CAPICOM • Capstone (cryptography) • Cardan grille • Card catalog (cryptology) • Carlisle Adams • CAST-128 • CAST-256 • Cayley–Purser algorithm • CBC-MAC • CCM mode • CCMP • CD-57 • CDMF • Cellular Message Encryption Algorithm •
• Central Security Service • Centre for Applied Cryptographic Research • Central Bureau •D
D'Agapeyeff cipher • Daniel J. Bernstein • Data Authentication Algorithm • Data Encryption Standard • Datagram Transport Layer Security • David Chaum • David Kahn • David Naccache • David Wagner • David Wheeler (computer scientist) • Davies attack •
• DEAL • Decipherment • Decisional Diffie–Hellman assumption • Decorrelation theory • • DeCSS •E
E0 (cipher) • E2 (cipher) • E4M •
• • EAX mode • ECC patents • ECHELON • ECRYPT • Edouard Fleissner von Wostrowitz • Edward Hebern • Edward Scheidt • Edward Travis • EFF DES cracker • Efficient Probabilistic Public-Key Encryption Scheme • • Electronic Communications Act 2000 • • Electronic signature • Electronic voting • ElGamal encryption • ElGamal signature scheme • Eli Biham •F
• Fast syndrome-based hash • FEA-M • FEAL • Feige–Fiat–Shamir identification scheme • Feistel cipher • Félix Delastelle • Fialka • Filesystem-level encryption • FileVault • Fill device • Financial cryptography • FIPS 140 • FIPS 140-2 • Firefly (key exchange protocol) • FISH (cipher) • Fish (cryptography) • Floradora • Fluhrer, Mantin and Shamir attack • Format-preserving encryption • Fortezza •G
Galois/Counter Mode • Gardening (cryptanalysis) • GCHQ Bude •
H
I
Ian Goldberg • IBM 4758 • ICE (cipher) •
J
K
Kaisa Nyberg • Kalyna (cipher) • Kasiski examination • KASUMI • KCDSA • KeePass • Kerberos (protocol) • Kerckhoffs's principle • Kevin McCurley (cryptographer) • Key-agreement protocol • Key authentication • Key clustering • Key (cryptography) • Key derivation function • Key distribution center • Key escrow • Key exchange • Keyfile • Key generation • Key generator • Key management • Key-recovery attack • Key schedule • Key server (cryptographic) • Key signature (cryptography) • Keysigning • Key signing party • Key size •
• Keystream • Key stretching • Key whitening • KG-84 • KHAZAD • Khufu and Khafre • Kiss (cryptanalysis) • KL-43 • KL-51 • KL-7 • Kleptography • KN-Cipher • Knapsack problem • Known-key distinguishing attack • Known-plaintext attack • KnownSafe • • KOV-14 • Kryha • Kryptos • KSD-64 • Kupyna • Kuznyechik • KW-26 • KW-37 • KY-3 • KY-57 • KY-58 • KY-68 • KYK-13L
Lacida • Ladder-DES • Lamport signature •
M
M6 (cipher) • M8 (cipher) • M-209 • M-325 • M-94 • MacGuffin (cipher) • Madryga • MAGENTA • Magic (cryptography) • Maksymilian Ciężki • Malcolm J. Williamson • Malleability (cryptography) • Man-in-the-middle attack • Marian Rejewski •
• Martin Hellman • • • Matt Blaze • Matt Robshaw • Max Newman • McEliece cryptosystem • mcrypt • • MD4 • MD5 • MD5CRK • MDC-2 • MDS matrix • • Meet-in-the-middle attack • Mental poker • Mercury (cipher machine) • Mercy (cipher) • Meredith Gardner • Merkle signature scheme • Merkle–Damgård construction • Merkle–Hellman knapsack cryptosystem • Merkle's Puzzles • Merkle tree • MESH (cipher) • Message authentication • Message authentication code • Message forgery • MI8 • Michael Luby • MICKEY • Microdot • • Military Cryptanalytics • Mimic function • Mirror writing • MISTY1 • Mitsuru Matsui • MMB (cipher) • Mod n cryptanalysis • MQV • MS-CHAP • MUGI • MULTI-S01 • MultiSwap • Multivariate cryptographyN
National Communications Centre • National Cryptologic Museum • National Security Agency • National Cipher Challenge • Navajo I • Neal Koblitz • Needham–Schroeder protocol • Negligible function • NEMA (machine) • NESSIE • Network Security Services • Neural cryptography • New Data Seal • NewDES •
• Nicolas Courtois • Niederreiter cryptosystem • Niels Ferguson • Nigel de Grey • Nihilist cipher • Nikita Borisov • Nimbus (cipher) • NIST hash function competition • Nonlinear-feedback shift register • NOEKEON • • Noreen •O
Oblivious transfer • OCB mode • Oded Goldreich •
P
Padding (cryptography) • Padding oracle attack • Paillier cryptosystem • Pairing-based cryptography • Panama (cryptography) • Partitioning cryptanalysis • Passive attack • Passphrase • Password • Password-authenticated key agreement • Password cracking • Password Hashing Competition • Paul Kocher • Paulo Pancatuccio • Paulo S. L. M. Barreto • Paul van Oorschot • PBKDF2 • PC Bruno • Pepper (cryptography) •
Q
Q (cipher) • Qrpff • QUAD (cipher) • Quadratic sieve • Quantum coin flipping • Quantum cryptography • Quantum digital signature • Quantum fingerprinting • Quantum key distribution
R
Rabbit (cipher) • Rabin cryptosystem •
• RadioGatún • Rail fence cipher • Rainbow table • Ralph Merkle • Rambutan (cryptography) • • • Random number generator attack • Random oracle • RC2 • RC4 • RC5 • RC6 • Rebound attack • • Red/black concept • REDOC • Red Pike (cipher) • Reflector (cipher machine) • Regulation of Investigatory Powers Act 2000 • Reihenschieber • Rekeying (cryptography) • Related-key attack • Replay attack • Reservehandverfahren • Residual block termination •S
S-1 block cipher • SAFER • Salsa20 • Salt (cryptography) •
• Security Support Provider Interface • SAML • SAVILLE • SC2000 • Schnorr group • Schnorr signature • Schoof–Elkies–Atkin algorithm • SCIP • Scott Vanstone • Scrambler • Scramdisk • Scream (cipher) • Scrypt • Scytale • Seahorse (software) • SEAL (cipher) • Sean Murphy (cryptographer) • SECG • Secret broadcast • Secret decoder ring • • Secret sharing • Sectéra Secure Module • Secure access module • Secure channel • Secure Communication based on Quantum Cryptography •T
Tabula recta • Taher Elgamal •
• Tcpcrypt • Television encryption •U
UES (cipher) • Ultra (cryptography) • UMAC •
V
Venona project • Verifiable secret sharing • Verisign • Very smooth hash • VEST • VIC cipher • VideoCrypt • Vigenère cipher • Vincent Rijmen • VINSON • Virtual private network • Visual cryptography • Voynich manuscript
W
Wadsworth's cipher • WAKE • WLAN Authentication and Privacy Infrastructure • Watermark (data file) • Watermarking attack • Weak key • Web of trust • Whirlpool (hash function) • Whitfield Diffie • Wide Mouth Frog protocol • Wi-Fi Protected Access • William F. Friedman • William Montgomery (cryptographer) • WinSCP • Wired Equivalent Privacy • Wireless Transport Layer Security • Witness-indistinguishable proof •
• World War I cryptography • World War II cryptography • W. T. TutteX
X.509 • XDH assumption •
Y
Z
Zeroisation • Zero-knowledge password proof • Zero-knowledge proof • Zfone • Zodiac (cipher) • ZRTP • Zimmermann–Sassaman key-signing protocol • Zimmermann Telegram
See also
- Outline of cryptography – an analytical list of articles and terms.
- Books on cryptography – an annotated list of suggested readings.
- List of cryptographers – an annotated list of cryptographers.
- Important publications in cryptography – some cryptography papers in computer science.
- WikiProject Cryptography – discussion and resources for editing cryptography articles.