OurBigBook Wikipedia Bot
Documentation
Cryptography
OurBigBook Wikipedia Bot
Mathematics
Fields of mathematics
Applied mathematics
toc
wiki
nosplit
articles:
2k
Table of contents
2k
1. Applications of cryptography
link
nosplit
Cryptography
40
1.1. Anonymity networks
link
nosplit
Applications of cryptography
1.2. Authentication methods
link
nosplit
Applications of cryptography
1.3. Decentralized autonomous organizations
link
nosplit
Applications of cryptography
1.4. Digital rights management
link
nosplit
Applications of cryptography
1.5. E-commerce
link
nosplit
Applications of cryptography
1.6. Financial cryptography
link
nosplit
Applications of cryptography
1.7. Kleptography
link
nosplit
Applications of cryptography
1.8. Ransomware
link
nosplit
Applications of cryptography
1.9. Secret broadcasting
link
nosplit
Applications of cryptography
1.10. All-or-nothing transform
link
nosplit
Applications of cryptography
1.11. Authentication
link
nosplit
Applications of cryptography
1.12. Bingo voting
link
nosplit
Applications of cryptography
1.13. Broadcast encryption
link
nosplit
Applications of cryptography
1.14. ChainGPT
link
nosplit
Applications of cryptography
1.15. Code signing
link
nosplit
Applications of cryptography
1.16. Confidentiality
link
nosplit
Applications of cryptography
1.17. Crypto-anarchism
link
nosplit
Applications of cryptography
1.18. Cryptocurrency
link
nosplit
Applications of cryptography
1.19. DRE-i with enhanced privacy
link
nosplit
Applications of cryptography
1.20. Foreign instrumentation signals intelligence
link
nosplit
Applications of cryptography
1.21. Friend-to-friend
link
nosplit
Applications of cryptography
1.22. LinOTP
link
nosplit
Applications of cryptography
1.23. MultiOTP
link
nosplit
Applications of cryptography
1.24. OpenBSD Cryptographic Framework
link
nosplit
Applications of cryptography
1.25. OpenPuff
link
nosplit
Applications of cryptography
1.26. Passwordless authentication
link
nosplit
Applications of cryptography
1.27. Prêt à Voter
link
nosplit
Applications of cryptography
1.28. Pseudonym
link
nosplit
Applications of cryptography
1.29. Publicly Verifiable Secret Sharing
link
nosplit
Applications of cryptography
1.30. Punchscan
link
nosplit
Applications of cryptography
1.31. Radiofrequency MASINT
link
nosplit
Applications of cryptography
1.32. Risk-based authentication
link
nosplit
Applications of cryptography
1.33. Rublon
link
nosplit
Applications of cryptography
1.34. Scantegrity
link
nosplit
Applications of cryptography
1.35. Signals intelligence by alliances, nations and industries
link
nosplit
Applications of cryptography
1.36. Signals intelligence operational platforms by nation
link
nosplit
Applications of cryptography
1.37. Steganography tools
link
nosplit
Applications of cryptography
1.38. Traitor tracing
link
nosplit
Applications of cryptography
1.39. WikiLeaks
link
nosplit
Applications of cryptography
1.40. X.1035
link
nosplit
Applications of cryptography
2. Classical cryptography
link
nosplit
Cryptography
5
2.1. Classical ciphers
link
nosplit
Classical cryptography
2.2. Cardan grille
link
nosplit
Classical cryptography
2.3. Cipher runes
link
nosplit
Classical cryptography
2.4. Kiss (cryptanalysis)
link
nosplit
Classical cryptography
2.5. Russian copulation
link
nosplit
Classical cryptography
3. Cryptographers
link
nosplit
Cryptography
13
3.1. Cryptographer stubs
link
nosplit
Cryptographers
3.2. Cryptographers by nationality
link
nosplit
Cryptographers
3.3. International Association for Cryptologic Research fellows
link
nosplit
Cryptographers
3.4. Modern cryptographers
link
nosplit
Cryptographers
3.5. Pre-computer cryptographers
link
nosplit
Cryptographers
3.6. Recreational cryptographers
link
nosplit
Cryptographers
3.7. Women cryptographers
link
nosplit
Cryptographers
3.8. Aggelos Kiayias
link
nosplit
Cryptographers
3.9. Julia Wetzel
link
nosplit
Cryptographers
3.10. Laura Holmes
link
nosplit
Cryptographers
3.11. List of cryptographers
link
nosplit
Cryptographers
3.12. Nadim Kobeissi
link
nosplit
Cryptographers
3.13. Taino (rapper)
link
nosplit
Cryptographers
4. Cryptographic attacks
link
nosplit
Cryptography
109
4.1. Attacks on public-key cryptosystems
link
nosplit
Cryptographic attacks
4.2. Chosen-plaintext attacks
link
nosplit
Cryptographic attacks
4.3. Cryptanalytic software
link
nosplit
Cryptographic attacks
4.4. Password cracking software
link
nosplit
Cryptographic attacks
4.5. Side-channel attacks
link
nosplit
Cryptographic attacks
4.6. 3-subset meet-in-the-middle attack
link
nosplit
Cryptographic attacks
4.7. Acoustic cryptanalysis
link
nosplit
Cryptographic attacks
4.8. Adaptive chosen-ciphertext attack
link
nosplit
Cryptographic attacks
4.9. Adversary (cryptography)
link
nosplit
Cryptographic attacks
4.10. Aircrack-ng
link
nosplit
Cryptographic attacks
4.11. Attack model
link
nosplit
Cryptographic attacks
4.12. Biclique attack
link
nosplit
Cryptographic attacks
4.13. Birthday attack
link
nosplit
Cryptographic attacks
4.14. Bit-flipping attack
link
nosplit
Cryptographic attacks
4.15. Black-bag cryptanalysis
link
nosplit
Cryptographic attacks
4.16. Black bag operation
link
nosplit
Cryptographic attacks
4.17. Boomerang attack
link
nosplit
Cryptographic attacks
4.18. Brute-force attack
link
nosplit
Cryptographic attacks
4.19. Chosen-ciphertext attack
link
nosplit
Cryptographic attacks
4.20. Ciphertext-only attack
link
nosplit
Cryptographic attacks
4.21. Collision attack
link
nosplit
Cryptographic attacks
4.22. Contact analysis
link
nosplit
Cryptographic attacks
4.23. Coppersmith's attack
link
nosplit
Cryptographic attacks
4.24. Correlation attack
link
nosplit
Cryptographic attacks
4.25. Cryptanalytic computer
link
nosplit
Cryptographic attacks
4.26. CryptoLocker
link
nosplit
Cryptographic attacks
4.27. Cube attack
link
nosplit
Cryptographic attacks
4.28. Custom hardware attack
link
nosplit
Cryptographic attacks
4.29. DROWN attack
link
nosplit
Cryptographic attacks
4.30. Davies attack
link
nosplit
Cryptographic attacks
4.31. Dictionary attack
link
nosplit
Cryptographic attacks
4.32. Differential-linear attack
link
nosplit
Cryptographic attacks
4.33. Differential cryptanalysis
link
nosplit
Cryptographic attacks
4.34. Distinguishing attack
link
nosplit
Cryptographic attacks
4.35. Distributed.net
link
nosplit
Cryptographic attacks
4.36. Downgrade attack
link
nosplit
Cryptographic attacks
4.37. Duqu
link
nosplit
Cryptographic attacks
4.38. ElcomSoft
link
nosplit
Cryptographic attacks
4.39. FREAK
link
nosplit
Cryptographic attacks
4.40. Flame (malware)
link
nosplit
Cryptographic attacks
4.41. Fluhrer, Mantin and Shamir attack
link
nosplit
Cryptographic attacks
4.42. Frequency analysis
link
nosplit
Cryptographic attacks
4.43. Gardening (cryptanalysis)
link
nosplit
Cryptographic attacks
4.44. Hardware backdoor
link
nosplit
Cryptographic attacks
4.45. Hardware keylogger
link
nosplit
Cryptographic attacks
4.46. Higher-order differential cryptanalysis
link
nosplit
Cryptographic attacks
4.47. Impossible differential cryptanalysis
link
nosplit
Cryptographic attacks
4.48. Index of coincidence
link
nosplit
Cryptographic attacks
4.49. Integral cryptanalysis
link
nosplit
Cryptographic attacks
4.50. Interlock protocol
link
nosplit
Cryptographic attacks
4.51. Interpolation attack
link
nosplit
Cryptographic attacks
4.52. John Herivel
link
nosplit
Cryptographic attacks
4.53. Kasiski examination
link
nosplit
Cryptographic attacks
4.54. Key-recovery attack
link
nosplit
Cryptographic attacks
4.55. Keystroke logging
link
nosplit
Cryptographic attacks
4.56. Known-key distinguishing attack
link
nosplit
Cryptographic attacks
4.57. Known-plaintext attack
link
nosplit
Cryptographic attacks
4.58. Length extension attack
link
nosplit
Cryptographic attacks
4.59. Linear cryptanalysis
link
nosplit
Cryptographic attacks
4.60. Locky
link
nosplit
Cryptographic attacks
4.61. LogicLocker
link
nosplit
Cryptographic attacks
4.62. Lucky Thirteen attack
link
nosplit
Cryptographic attacks
4.63. MD5CRK
link
nosplit
Cryptographic attacks
4.64. Man-in-the-middle attack
link
nosplit
Cryptographic attacks
4.65. Meet-in-the-middle attack
link
nosplit
Cryptographic attacks
4.66. Message forgery
link
nosplit
Cryptographic attacks
4.67. Metasploit
link
nosplit
Cryptographic attacks
4.68. Microsoft Office password protection
link
nosplit
Cryptographic attacks
4.69. Military Cryptanalytics
link
nosplit
Cryptographic attacks
4.70. Mod n cryptanalysis
link
nosplit
Cryptographic attacks
4.71. Padding oracle attack
link
nosplit
Cryptographic attacks
4.72. Partial-matching meet-in-the-middle attack
link
nosplit
Cryptographic attacks
4.73. Partitioning cryptanalysis
link
nosplit
Cryptographic attacks
4.74. Passive attack
link
nosplit
Cryptographic attacks
4.75. Password cracking
link
nosplit
Cryptographic attacks
4.76. Piling-up lemma
link
nosplit
Cryptographic attacks
4.77. Pre-play attack
link
nosplit
Cryptographic attacks
4.78. Preimage attack
link
nosplit
Cryptographic attacks
4.79. Pwdump
link
nosplit
Cryptographic attacks
4.80. ROCA vulnerability
link
nosplit
Cryptographic attacks
4.81. Rebound attack
link
nosplit
Cryptographic attacks
4.82. Regin (malware)
link
nosplit
Cryptographic attacks
4.83. Related-key attack
link
nosplit
Cryptographic attacks
4.84. Replay attack
link
nosplit
Cryptographic attacks
4.85. Riverbank Publications
link
nosplit
Cryptographic attacks
4.86. Rootkit
link
nosplit
Cryptographic attacks
4.87. Rotational cryptanalysis
link
nosplit
Cryptographic attacks
4.88. Rubber-hose cryptanalysis
link
nosplit
Cryptographic attacks
4.89. SciEngines GmbH
link
nosplit
Cryptographic attacks
4.90. Self-service password reset
link
nosplit
Cryptographic attacks
4.91. Side-channel attack
link
nosplit
Cryptographic attacks
4.92. Slide attack
link
nosplit
Cryptographic attacks
4.93. Small subgroup confinement attack
link
nosplit
Cryptographic attacks
4.94. Steganalysis
link
nosplit
Cryptographic attacks
4.95. Stream cipher attacks
link
nosplit
Cryptographic attacks
4.96. Stuxnet
link
nosplit
Cryptographic attacks
4.97. Supply chain attack
link
nosplit
Cryptographic attacks
4.98. Tempest (codename)
link
nosplit
Cryptographic attacks
4.99. TeslaCrypt
link
nosplit
Cryptographic attacks
4.100. Time/memory/data tradeoff attack
link
nosplit
Cryptographic attacks
4.101. Traffic analysis
link
nosplit
Cryptographic attacks
4.102. Truncated differential cryptanalysis
link
nosplit
Cryptographic attacks
4.103. Turingery
link
nosplit
Cryptographic attacks
4.104. Watermarking attack
link
nosplit
Cryptographic attacks
4.105. Weak key
link
nosplit
Cryptographic attacks
4.106. Wiener's attack
link
nosplit
Cryptographic attacks
4.107. XSL attack
link
nosplit
Cryptographic attacks
4.108. Zendian problem
link
nosplit
Cryptographic attacks
4.109. Zygalski sheets
link
nosplit
Cryptographic attacks
5. Cryptographic hardware
link
nosplit
Cryptography
55
5.1. Cryptanalytic devices
link
nosplit
Cryptographic hardware
5.2. Encryption device accessories
link
nosplit
Cryptographic hardware
5.3. Encryption devices
link
nosplit
Cryptographic hardware
5.4. Smart cards
link
nosplit
Cryptographic hardware
5.5. BID/60
link
nosplit
Cryptographic hardware
5.6. BID 610
link
nosplit
Cryptographic hardware
5.7. Blockscale
link
nosplit
Cryptographic hardware
5.8. CYPRIS (microchip)
link
nosplit
Cryptographic hardware
5.9. Combined Cipher Machine
link
nosplit
Cryptographic hardware
5.10. Creed & Company
link
nosplit
Cryptographic hardware
5.11. Cryptex
link
nosplit
Cryptographic hardware
5.12. Cryptographic accelerator
link
nosplit
Cryptographic hardware
5.13. EFF DES cracker
link
nosplit
Cryptographic hardware
5.14. ESIM
link
nosplit
Cryptographic hardware
5.15. Enigma machine
link
nosplit
Cryptographic hardware
5.16. Fialka
link
nosplit
Cryptographic hardware
5.17. Fish (cryptography)
link
nosplit
Cryptographic hardware
5.18. Hardware-based full disk encryption
link
nosplit
Cryptographic hardware
5.19. Hardware security module
link
nosplit
Cryptographic hardware
5.20. Hebern rotor machine
link
nosplit
Cryptographic hardware
5.21. Hengzhi chip
link
nosplit
Cryptographic hardware
5.22. IBM 4758
link
nosplit
Cryptographic hardware
5.23. IBM 4764
link
nosplit
Cryptographic hardware
5.24. IBM 4765
link
nosplit
Cryptographic hardware
5.25. IBM 4767
link
nosplit
Cryptographic hardware
5.26. IBM 4768
link
nosplit
Cryptographic hardware
5.27. IBM 4769
link
nosplit
Cryptographic hardware
5.28. KG-13
link
nosplit
Cryptographic hardware
5.29. Lacida
link
nosplit
Cryptographic hardware
5.30. Lorenz cipher
link
nosplit
Cryptographic hardware
5.31. M-209
link
nosplit
Cryptographic hardware
5.32. M-325
link
nosplit
Cryptographic hardware
5.33. M-94
link
nosplit
Cryptographic hardware
5.34. Mercury (cipher machine)
link
nosplit
Cryptographic hardware
5.35. NEMA (machine)
link
nosplit
Cryptographic hardware
5.36. Nitrokey
link
nosplit
Cryptographic hardware
5.37. Noreen
link
nosplit
Cryptographic hardware
5.38. OMI cryptograph
link
nosplit
Cryptographic hardware
5.39. Pinwheel (cryptography)
link
nosplit
Cryptographic hardware
5.40. Plugboard
link
nosplit
Cryptographic hardware
5.41. Rambutan (cryptography)
link
nosplit
Cryptographic hardware
5.42. SIGABA
link
nosplit
Cryptographic hardware
5.43. SIM card
link
nosplit
Cryptographic hardware
5.44. Schlüsselgerät 39
link
nosplit
Cryptographic hardware
5.45. Schlüsselgerät 41
link
nosplit
Cryptographic hardware
5.46. Secure cryptoprocessor
link
nosplit
Cryptographic hardware
5.47. Secure telephone
link
nosplit
Cryptographic hardware
5.48. Siemens and Halske T52
link
nosplit
Cryptographic hardware
5.49. Stencil Subtractor
link
nosplit
Cryptographic hardware
5.50. Syko Cipher Device
link
nosplit
Cryptographic hardware
5.51. TLS acceleration
link
nosplit
Cryptographic hardware
5.52. Tamper-resistant security module
link
nosplit
Cryptographic hardware
5.53. Titan Security Key
link
nosplit
Cryptographic hardware
5.54. Typex
link
nosplit
Cryptographic hardware
5.55. YubiKey
link
nosplit
Cryptographic hardware
6. Cryptographic primitives
link
nosplit
Cryptography
31
6.1. Computational hardness assumptions
link
nosplit
Cryptographic primitives
6.2. Black-box obfuscation
link
nosplit
Cryptographic primitives
6.3. Block cipher
link
nosplit
Cryptographic primitives
6.4. Bricklayer function
link
nosplit
Cryptographic primitives
6.5. Commitment scheme
link
nosplit
Cryptographic primitives
6.6. Comparison of cryptographic hash functions
link
nosplit
Cryptographic primitives
6.7. Cryptographic hash function
link
nosplit
Cryptographic primitives
6.8. Cryptographic primitive
link
nosplit
Cryptographic primitives
6.9. Digital signature
link
nosplit
Cryptographic primitives
6.10. Distributed point function
link
nosplit
Cryptographic primitives
6.11. Functional encryption
link
nosplit
Cryptographic primitives
6.12. Group signature
link
nosplit
Cryptographic primitives
6.13. HEAAN
link
nosplit
Cryptographic primitives
6.14. Homomorphic encryption
link
nosplit
Cryptographic primitives
6.15. Indistinguishability obfuscation
link
nosplit
Cryptographic primitives
6.16. Key exchange
link
nosplit
Cryptographic primitives
6.17. Mask generation function
link
nosplit
Cryptographic primitives
6.18. Mix network
link
nosplit
Cryptographic primitives
6.19. Oblivious transfer
link
nosplit
Cryptographic primitives
6.20. One-way compression function
link
nosplit
Cryptographic primitives
6.21. One-way function
link
nosplit
Cryptographic primitives
6.22. Private information retrieval
link
nosplit
Cryptographic primitives
6.23. Pseudorandom permutation
link
nosplit
Cryptographic primitives
6.24. Round (cryptography)
link
nosplit
Cryptographic primitives
6.25. Searchable symmetric encryption
link
nosplit
Cryptographic primitives
6.26. Shabal
link
nosplit
Cryptographic primitives
6.27. Stream cipher
link
nosplit
Cryptographic primitives
6.28. Structured encryption
link
nosplit
Cryptographic primitives
6.29. T-function
link
nosplit
Cryptographic primitives
6.30. Trapdoor function
link
nosplit
Cryptographic primitives
6.31. Types of physical unclonable function
link
nosplit
Cryptographic primitives
7. Cryptographic protocols
link
nosplit
Cryptography
127
7.1. Authentication protocols
link
nosplit
Cryptographic protocols
7.2. Computer access control protocols
link
nosplit
Cryptographic protocols
7.3. Key-agreement protocols
link
nosplit
Cryptographic protocols
7.4. Key transport protocols
link
nosplit
Cryptographic protocols
7.5. Mix networks
link
nosplit
Cryptographic protocols
7.6. Multicast encryption
link
nosplit
Cryptographic protocols
7.7. Secure Shell
link
nosplit
Cryptographic protocols
7.8. Zero-knowledge protocols
link
nosplit
Cryptographic protocols
7.9. 3-D Secure
link
nosplit
Cryptographic protocols
7.10. ALTS
link
nosplit
Cryptographic protocols
7.11. ANSI ASC X9.95 Standard
link
nosplit
Cryptographic protocols
7.12. AS1 (networking)
link
nosplit
Cryptographic protocols
7.13. AS2
link
nosplit
Cryptographic protocols
7.14. Alice and Bob
link
nosplit
Cryptographic protocols
7.15. Anshel–Anshel–Goldfeld key exchange
link
nosplit
Cryptographic protocols
7.16. Anti-replay
link
nosplit
Cryptographic protocols
7.17. AuthIP
link
nosplit
Cryptographic protocols
7.18. Authentication and Key Agreement
link
nosplit
Cryptographic protocols
7.19. Automatic Certificate Management Environment
link
nosplit
Cryptographic protocols
7.20. Autoroll
link
nosplit
Cryptographic protocols
7.21. BGPsec
link
nosplit
Cryptographic protocols
7.22. Bilateral key exchange
link
nosplit
Cryptographic protocols
7.23. BitTorrent protocol encryption
link
nosplit
Cryptographic protocols
7.24. Broadcast to Allied Merchant Ships
link
nosplit
Cryptographic protocols
7.25. CAVE-based authentication
link
nosplit
Cryptographic protocols
7.26. CCMP (cryptography)
link
nosplit
Cryptographic protocols
7.27. CECPQ1
link
nosplit
Cryptographic protocols
7.28. CECPQ2
link
nosplit
Cryptographic protocols
7.29. Certificate Management Protocol
link
nosplit
Cryptographic protocols
7.30. Certificate Management over CMS
link
nosplit
Cryptographic protocols
7.31. Certification path validation algorithm
link
nosplit
Cryptographic protocols
7.32. Code Access Security
link
nosplit
Cryptographic protocols
7.33. Cryptographic Message Syntax
link
nosplit
Cryptographic protocols
7.34. Cryptographic protocol
link
nosplit
Cryptographic protocols
7.35. Cryptographically Generated Address
link
nosplit
Cryptographic protocols
7.36. Datagram Transport Layer Security
link
nosplit
Cryptographic protocols
7.37. Delegated Path Discovery
link
nosplit
Cryptographic protocols
7.38. Delegated Path Validation
link
nosplit
Cryptographic protocols
7.39. Delegated credential
link
nosplit
Cryptographic protocols
7.40. Deniable authentication
link
nosplit
Cryptographic protocols
7.41. Digest access authentication
link
nosplit
Cryptographic protocols
7.42. DigiCipher 2
link
nosplit
Cryptographic protocols
7.43. Digital credential
link
nosplit
Cryptographic protocols
7.44. Distance-bounding protocol
link
nosplit
Cryptographic protocols
7.45. Distributed System Security Architecture
link
nosplit
Cryptographic protocols
7.46. DomainKeys
link
nosplit
Cryptographic protocols
7.47. DomainKeys Identified Mail
link
nosplit
Cryptographic protocols
7.48. Ecash
link
nosplit
Cryptographic protocols
7.49. Encrypted key exchange
link
nosplit
Cryptographic protocols
7.50. Enrollment over Secure Transport
link
nosplit
Cryptographic protocols
7.51. Firefly (key exchange protocol)
link
nosplit
Cryptographic protocols
7.52. Garbled circuit
link
nosplit
Cryptographic protocols
7.53. Garlic routing
link
nosplit
Cryptographic protocols
7.54. Generic Bootstrapping Architecture
link
nosplit
Cryptographic protocols
7.55. Generic Security Service Algorithm for Secret Key Transaction
link
nosplit
Cryptographic protocols
7.56. Grid Security Infrastructure
link
nosplit
Cryptographic protocols
7.57. Group Domain of Interpretation
link
nosplit
Cryptographic protocols
7.58. H.235
link
nosplit
Cryptographic protocols
7.59. HTTP/1.1 Upgrade header
link
nosplit
Cryptographic protocols
7.60. HTTPS
link
nosplit
Cryptographic protocols
7.61. Hashcash
link
nosplit
Cryptographic protocols
7.62. High Assurance Internet Protocol Encryptor
link
nosplit
Cryptographic protocols
7.63. Host Identity Protocol
link
nosplit
Cryptographic protocols
7.64. I2P
link
nosplit
Cryptographic protocols
7.65. IEEE 802.11i-2004
link
nosplit
Cryptographic protocols
7.66. IPsec
link
nosplit
Cryptographic protocols
7.67. Integrated Encryption Scheme
link
nosplit
Cryptographic protocols
7.68. Internet Key Exchange
link
nosplit
Cryptographic protocols
7.69. Internet Security Association and Key Management Protocol
link
nosplit
Cryptographic protocols
7.70. JSON Web Encryption
link
nosplit
Cryptographic protocols
7.71. Kerberized Internet Negotiation of Keys
link
nosplit
Cryptographic protocols
7.72. Key-based routing
link
nosplit
Cryptographic protocols
7.73. Key Management Interoperability Protocol
link
nosplit
Cryptographic protocols
7.74. List of Tor onion services
link
nosplit
Cryptographic protocols
7.75. MIKEY
link
nosplit
Cryptographic protocols
7.76. Microsoft Point-to-Point Encryption
link
nosplit
Cryptographic protocols
7.77. Multi-party fair exchange protocol
link
nosplit
Cryptographic protocols
7.78. Neuman–Stubblebine protocol
link
nosplit
Cryptographic protocols
7.79. NewHope
link
nosplit
Cryptographic protocols
7.80. OCSP stapling
link
nosplit
Cryptographic protocols
7.81. OMEMO
link
nosplit
Cryptographic protocols
7.82. Oakley protocol
link
nosplit
Cryptographic protocols
7.83. Off-the-Record Messaging
link
nosplit
Cryptographic protocols
7.84. Offline private key protocol
link
nosplit
Cryptographic protocols
7.85. Onion routing
link
nosplit
Cryptographic protocols
7.86. Online Certificate Status Protocol
link
nosplit
Cryptographic protocols
7.87. Openswan
link
nosplit
Cryptographic protocols
7.88. PQXDH
link
nosplit
Cryptographic protocols
7.89. Password Authenticated Key Exchange by Juggling
link
nosplit
Cryptographic protocols
7.90. Privacy-Enhanced Mail
link
nosplit
Cryptographic protocols
7.91. Private Communications Technology
link
nosplit
Cryptographic protocols
7.92. Proof of secure erasure
link
nosplit
Cryptographic protocols
7.93. Protocol for Carrying Authentication for Network Access
link
nosplit
Cryptographic protocols
7.94. Publius (publishing system)
link
nosplit
Cryptographic protocols
7.95. SCVP
link
nosplit
Cryptographic protocols
7.96. SPNEGO
link
nosplit
Cryptographic protocols
7.97. Salted Challenge Response Authentication Mechanism
link
nosplit
Cryptographic protocols
7.98. Secure Communications Interoperability Protocol
link
nosplit
Cryptographic protocols
7.99. Secure Hypertext Transfer Protocol
link
nosplit
Cryptographic protocols
7.100. Secure Neighbor Discovery
link
nosplit
Cryptographic protocols
7.101. Secure Real-time Transport Protocol
link
nosplit
Cryptographic protocols
7.102. Secure copy protocol
link
nosplit
Cryptographic protocols
7.103. Secure multi-party computation
link
nosplit
Cryptographic protocols
7.104. Security Protocols Open Repository
link
nosplit
Cryptographic protocols
7.105. Signal Protocol
link
nosplit
Cryptographic protocols
7.106. Signature Record Type Definition
link
nosplit
Cryptographic protocols
7.107. Silent Circle Instant Messaging Protocol
link
nosplit
Cryptographic protocols
7.108. Simple Authentication and Security Layer
link
nosplit
Cryptographic protocols
7.109. Simple Certificate Enrollment Protocol
link
nosplit
Cryptographic protocols
7.110. Simultaneous Authentication of Equals
link
nosplit
Cryptographic protocols
7.111. Tcpcrypt
link
nosplit
Cryptographic protocols
7.112. Temporal Key Integrity Protocol
link
nosplit
Cryptographic protocols
7.113. Time stamp protocol
link
nosplit
Cryptographic protocols
7.114. Tor (network)
link
nosplit
Cryptographic protocols
7.115. Transport Layer Security
link
nosplit
Cryptographic protocols
7.116. Vouch by Reference
link
nosplit
Cryptographic protocols
7.117. WLAN Authentication and Privacy Infrastructure
link
nosplit
Cryptographic protocols
7.118. Wi-Fi Protected Access
link
nosplit
Cryptographic protocols
7.119. Wi-Fi Protected Setup
link
nosplit
Cryptographic protocols
7.120. Wired Equivalent Privacy
link
nosplit
Cryptographic protocols
7.121. Wireless Transport Layer Security
link
nosplit
Cryptographic protocols
7.122. X.509
link
nosplit
Cryptographic protocols
7.123. XKMS
link
nosplit
Cryptographic protocols
7.124. YAK (cryptography)
link
nosplit
Cryptographic protocols
7.125. Yahalom (protocol)
link
nosplit
Cryptographic protocols
7.126. ZRTP
link
nosplit
Cryptographic protocols
7.127. Zimmermann–Sassaman key-signing protocol
link
nosplit
Cryptographic protocols
8. Cryptographic software
link
nosplit
Cryptography
164
8.1. OpenPGP
link
nosplit
Cryptographic software
8.2. SSH File Transfer Protocol clients
link
nosplit
Cryptographic software
8.3. Tor (anonymity network)
link
nosplit
Cryptographic software
8.4. Transport Layer Security implementation
link
nosplit
Cryptographic software
8.5. ACE Encrypt
link
nosplit
Cryptographic software
8.6. AbsoluteTelnet
link
nosplit
Cryptographic software
8.7. Acid Cryptofiler
link
nosplit
Cryptographic software
8.8. Android Privacy Guard
link
nosplit
Cryptographic software
8.9. Authenticated Identity Body
link
nosplit
Cryptographic software
8.10. Autocrypt
link
nosplit
Cryptographic software
8.11. BSAFE
link
nosplit
Cryptographic software
8.12. Bcrypt
link
nosplit
Cryptographic software
8.13. BestCrypt
link
nosplit
Cryptographic software
8.14. BitLocker
link
nosplit
Cryptographic software
8.15. Bitfrost
link
nosplit
Cryptographic software
8.16. Bitmessage
link
nosplit
Cryptographic software
8.17. Bitwarden
link
nosplit
Cryptographic software
8.18. Botan (programming library)
link
nosplit
Cryptographic software
8.19. Bouncy Castle (cryptography)
link
nosplit
Cryptographic software
8.20. CAPICOM
link
nosplit
Cryptographic software
8.21. Ccrypt
link
nosplit
Cryptographic software
8.22. CipherSaber
link
nosplit
Cryptographic software
8.23. Column level encryption
link
nosplit
Cryptographic software
8.24. Comparison of SSH clients
link
nosplit
Cryptographic software
8.25. Comparison of SSH servers
link
nosplit
Cryptographic software
8.26. Comparison of TLS implementations
link
nosplit
Cryptographic software
8.27. Comparison of VoIP software
link
nosplit
Cryptographic software
8.28. Comparison of disk encryption software
link
nosplit
Cryptographic software
8.29. Comparison of encrypted external drives
link
nosplit
Cryptographic software
8.30. Confide
link
nosplit
Cryptographic software
8.31. Core FTP
link
nosplit
Cryptographic software
8.32. Corkscrew (program)
link
nosplit
Cryptographic software
8.33. CrossCrypt
link
nosplit
Cryptographic software
8.34. CrypTool
link
nosplit
Cryptographic software
8.35. Crypt (Unix)
link
nosplit
Cryptographic software
8.36. Cryptlib
link
nosplit
Cryptographic software
8.37. CryptoBuddy
link
nosplit
Cryptographic software
8.38. CryptoGraf
link
nosplit
Cryptographic software
8.39. CryptoVerif
link
nosplit
Cryptographic software
8.40. Crypto API (Linux)
link
nosplit
Cryptographic software
8.41. Cryptocat
link
nosplit
Cryptographic software
8.42. Cryptol
link
nosplit
Cryptographic software
8.43. Cryptoloop
link
nosplit
Cryptographic software
8.44. Dashlane
link
nosplit
Cryptographic software
8.45. Data Protection API
link
nosplit
Cryptographic software
8.46. Degree of anonymity
link
nosplit
Cryptographic software
8.47. Disk encryption software
link
nosplit
Cryptographic software
8.48. Dm-crypt
link
nosplit
Cryptographic software
8.49. Dropbear (software)
link
nosplit
Cryptographic software
8.50. E4M
link
nosplit
Cryptographic software
8.51. ECryptfs
link
nosplit
Cryptographic software
8.52. EJBCA
link
nosplit
Cryptographic software
8.53. ESSH Client
link
nosplit
Cryptographic software
8.54. Encrypting File System
link
nosplit
Cryptographic software
8.55. Encryption software
link
nosplit
Cryptographic software
8.56. Enigmail
link
nosplit
Cryptographic software
8.57. Everykey
link
nosplit
Cryptographic software
8.58. FileVault
link
nosplit
Cryptographic software
8.59. Filesystem-level encryption
link
nosplit
Cryptographic software
8.60. Flash proxy
link
nosplit
Cryptographic software
8.61. FreeOTFE
link
nosplit
Cryptographic software
8.62. GNU Privacy Guard
link
nosplit
Cryptographic software
8.63. GNU fcrypt
link
nosplit
Cryptographic software
8.64. GPG Mail
link
nosplit
Cryptographic software
8.65. GnoMint
link
nosplit
Cryptographic software
8.66. GnuTLS
link
nosplit
Cryptographic software
8.67. Gpg4win
link
nosplit
Cryptographic software
8.68. Guardian Project (software)
link
nosplit
Cryptographic software
8.69. HElib
link
nosplit
Cryptographic software
8.70. Hushmail
link
nosplit
Cryptographic software
8.71. I.CX
link
nosplit
Cryptographic software
8.72. IAIK-JCE
link
nosplit
Cryptographic software
8.73. Java Anon Proxy
link
nosplit
Cryptographic software
8.74. Java Cryptography Architecture
link
nosplit
Cryptographic software
8.75. KAME project
link
nosplit
Cryptographic software
8.76. KeePass
link
nosplit
Cryptographic software
8.77. KeeWeb
link
nosplit
Cryptographic software
8.78. Keygen
link
nosplit
Cryptographic software
8.79. L3cos
link
nosplit
Cryptographic software
8.80. LastPass
link
nosplit
Cryptographic software
8.81. Libdvdcss
link
nosplit
Cryptographic software
8.82. Libgcrypt
link
nosplit
Cryptographic software
8.83. LibreSSL
link
nosplit
Cryptographic software
8.84. Linux Unified Key Setup
link
nosplit
Cryptographic software
8.85. Mailfence
link
nosplit
Cryptographic software
8.86. Mailvelope
link
nosplit
Cryptographic software
8.87. MatrixSSL
link
nosplit
Cryptographic software
8.88. Mbed TLS
link
nosplit
Cryptographic software
8.89. McAfee Change Control
link
nosplit
Cryptographic software
8.90. Mcrypt
link
nosplit
Cryptographic software
8.91. Microsoft Autofill
link
nosplit
Cryptographic software
8.92. Microsoft CryptoAPI
link
nosplit
Cryptographic software
8.93. Microsoft SEAL
link
nosplit
Cryptographic software
8.94. Mitro
link
nosplit
Cryptographic software
8.95. Mod openpgp
link
nosplit
Cryptographic software
8.96. Mujahedeen Secrets
link
nosplit
Cryptographic software
8.97. NaCl (software)
link
nosplit
Cryptographic software
8.98. Nautilus (secure telephone)
link
nosplit
Cryptographic software
8.99. Netpgp
link
nosplit
Cryptographic software
8.100. Nettle (cryptographic library)
link
nosplit
Cryptographic software
8.101. Network Security Services
link
nosplit
Cryptographic software
8.102. Next-Generation Secure Computing Base
link
nosplit
Cryptographic software
8.103. NordLocker
link
nosplit
Cryptographic software
8.104. OTPW
link
nosplit
Cryptographic software
8.105. Offer Assistant
link
nosplit
Cryptographic software
8.106. OpenBSD
link
nosplit
Cryptographic software
8.107. OpenFHE
link
nosplit
Cryptographic software
8.108. OpenKeychain
link
nosplit
Cryptographic software
8.109. OpenSSH
link
nosplit
Cryptographic software
8.110. OpenSSL
link
nosplit
Cryptographic software
8.111. OpenXPKI
link
nosplit
Cryptographic software
8.112. Opportunistic encryption
link
nosplit
Cryptographic software
8.113. PALISADE (software)
link
nosplit
Cryptographic software
8.114. PGPDisk
link
nosplit
Cryptographic software
8.115. PGPfone
link
nosplit
Cryptographic software
8.116. Password Safe
link
nosplit
Cryptographic software
8.117. Peerio
link
nosplit
Cryptographic software
8.118. Phoner
link
nosplit
Cryptographic software
8.119. Pleasant Password Server
link
nosplit
Cryptographic software
8.120. Pretty Easy privacy
link
nosplit
Cryptographic software
8.121. Pretty Good Privacy
link
nosplit
Cryptographic software
8.122. Private Disk
link
nosplit
Cryptographic software
8.123. ProVerif
link
nosplit
Cryptographic software
8.124. Proton Mail
link
nosplit
Cryptographic software
8.125. PuTTY
link
nosplit
Cryptographic software
8.126. Rclone
link
nosplit
Cryptographic software
8.127. Retroshare
link
nosplit
Cryptographic software
8.128. Rubberhose (file system)
link
nosplit
Cryptographic software
8.129. S/KEY
link
nosplit
Cryptographic software
8.130. S2n
link
nosplit
Cryptographic software
8.131. SSLeay
link
nosplit
Cryptographic software
8.132. Scramdisk
link
nosplit
Cryptographic software
8.133. SecureCRT
link
nosplit
Cryptographic software
8.134. Sentry 2020
link
nosplit
Cryptographic software
8.135. Session (software)
link
nosplit
Cryptographic software
8.136. Sha1sum
link
nosplit
Cryptographic software
8.137. Signal (software)
link
nosplit
Cryptographic software
8.138. Silent Circle (software)
link
nosplit
Cryptographic software
8.139. Ssh-agent
link
nosplit
Cryptographic software
8.140. StrongSwan
link
nosplit
Cryptographic software
8.141. Stunnel
link
nosplit
Cryptographic software
8.142. Syndie
link
nosplit
Cryptographic software
8.143. Syskey
link
nosplit
Cryptographic software
8.144. Tamarin Prover
link
nosplit
Cryptographic software
8.145. Teamwire
link
nosplit
Cryptographic software
8.146. Tera Term
link
nosplit
Cryptographic software
8.147. TextSecure
link
nosplit
Cryptographic software
8.148. Threema
link
nosplit
Cryptographic software
8.149. Tinfoil Hat Linux
link
nosplit
Cryptographic software
8.150. Tresorit
link
nosplit
Cryptographic software
8.151. TrueCrypt
link
nosplit
Cryptographic software
8.152. TrueCrypt version history
link
nosplit
Cryptographic software
8.153. TtyEmulator
link
nosplit
Cryptographic software
8.154. Twinkle (software)
link
nosplit
Cryptographic software
8.155. United States v. Stumbo
link
nosplit
Cryptographic software
8.156. VeraCrypt
link
nosplit
Cryptographic software
8.157. Whisper Systems
link
nosplit
Cryptographic software
8.158. WinPT
link
nosplit
Cryptographic software
8.159. WinSCP
link
nosplit
Cryptographic software
8.160. Wire (software)
link
nosplit
Cryptographic software
8.161. WolfSSH
link
nosplit
Cryptographic software
8.162. WolfSSL
link
nosplit
Cryptographic software
8.163. Xx messenger
link
nosplit
Cryptographic software
8.164. Zfone
link
nosplit
Cryptographic software
9. Cryptography contests
link
nosplit
Cryptography
13
9.1. Advanced Encryption Standard process
link
nosplit
Cryptography contests
9.2. CAESAR Competition
link
nosplit
Cryptography contests
9.3. DESCHALL Project
link
nosplit
Cryptography contests
9.4. DES Challenges
link
nosplit
Cryptography contests
9.5. ESTREAM
link
nosplit
Cryptography contests
9.6. LCS35
link
nosplit
Cryptography contests
9.7. NESSIE
link
nosplit
Cryptography contests
9.8. NIST Post-Quantum Cryptography Standardization
link
nosplit
Cryptography contests
9.9. NIST hash function competition
link
nosplit
Cryptography contests
9.10. National Cipher Challenge
link
nosplit
Cryptography contests
9.11. Password Hashing Competition
link
nosplit
Cryptography contests
9.12. RSA Factoring Challenge
link
nosplit
Cryptography contests
9.13. RSA Secret-Key Challenge
link
nosplit
Cryptography contests
10. Cryptography law
link
nosplit
Cryptography
18
10.1. Cryptography case law
link
nosplit
Cryptography law
10.2. Encryption debate
link
nosplit
Cryptography law
10.3. Export and import control of cryptography
link
nosplit
Cryptography law
10.4. AACS encryption key controversy
link
nosplit
Cryptography law
10.5. Anti–computer forensics
link
nosplit
Cryptography law
10.6. DeCSS
link
nosplit
Cryptography law
10.7. ECC patents
link
nosplit
Cryptography law
10.8. Electronic Communications Act 2000
link
nosplit
Cryptography law
10.9. Electronic Signatures in Global and National Commerce Act
link
nosplit
Cryptography law
10.10. Electronic signatures and law
link
nosplit
Cryptography law
10.11. Government Paperwork Elimination Act
link
nosplit
Cryptography law
10.12. Illegal number
link
nosplit
Cryptography law
10.13. Key disclosure law
link
nosplit
Cryptography law
10.14. Penet remailer
link
nosplit
Cryptography law
10.15. Peter Junger
link
nosplit
Cryptography law
10.16. Qrpff
link
nosplit
Cryptography law
10.17. Regulation of Investigatory Powers Act 2000
link
nosplit
Cryptography law
10.18. Texas Instruments signing key controversy
link
nosplit
Cryptography law
11. Cryptography lists and comparisons
link
nosplit
Cryptography
12
11.1. Books on cryptography
link
nosplit
Cryptography lists and comparisons
11.2. Cipher security summary
link
nosplit
Cryptography lists and comparisons
11.3. Comparison of cryptography libraries
link
nosplit
Cryptography lists and comparisons
11.4. Glossary of cryptographic keys
link
nosplit
Cryptography lists and comparisons
11.5. Hash function security summary
link
nosplit
Cryptography lists and comparisons
11.6. Index of cryptography articles
link
nosplit
Cryptography lists and comparisons
11.7. List of applications using PKCS 11
link
nosplit
Cryptography lists and comparisons
11.8. List of ciphertexts
link
nosplit
Cryptography lists and comparisons
11.9. List of cryptographic file systems
link
nosplit
Cryptography lists and comparisons
11.10. List of telecommunications encryption terms
link
nosplit
Cryptography lists and comparisons
11.11. Outline of cryptography
link
nosplit
Cryptography lists and comparisons
11.12. Timeline of cryptography
link
nosplit
Cryptography lists and comparisons
12. Cryptography organizations
link
nosplit
Cryptography
76
12.1. Certificate authorities
link
nosplit
Cryptography organizations
12.2. Cryptography companies
link
nosplit
Cryptography organizations
12.3. Cryptography conferences
link
nosplit
Cryptography organizations
12.4. Cypherpunks
link
nosplit
Cryptography organizations
12.5. National Security Agency
link
nosplit
Cryptography organizations
12.6. National cyber security centres
link
nosplit
Cryptography organizations
12.7. United States Army Signals Intelligence Service
link
nosplit
Cryptography organizations
12.8. Abhorchdienst
link
nosplit
Cryptography organizations
12.9. American Cryptogram Association
link
nosplit
Cryptography organizations
12.10. Arlington Hall
link
nosplit
Cryptography organizations
12.11. Australian Cyber Security Centre
link
nosplit
Cryptography organizations
12.12. Australian Signals Directorate
link
nosplit
Cryptography organizations
12.13. B-Dienst
link
nosplit
Cryptography organizations
12.14. Black Chamber
link
nosplit
Cryptography organizations
12.15. Bletchley Park
link
nosplit
Cryptography organizations
12.16. CAcert.org
link
nosplit
Cryptography organizations
12.17. COSIC
link
nosplit
Cryptography organizations
12.18. Central Security Service
link
nosplit
Cryptography organizations
12.19. Centre for Applied Cryptographic Research
link
nosplit
Cryptography organizations
12.20. Centre for Cybersecurity & Cybercrime Investigation
link
nosplit
Cryptography organizations
12.21. Cipher Bureau (Poland)
link
nosplit
Cryptography organizations
12.22. Cipher Department of the High Command of the Luftwaffe
link
nosplit
Cryptography organizations
12.23. Cipher Department of the High Command of the Wehrmacht
link
nosplit
Cryptography organizations
12.24. Communications & Information Services Corps
link
nosplit
Cryptography organizations
12.25. Communications Security Establishment
link
nosplit
Cryptography organizations
12.26. Cryptology Research Society of India
link
nosplit
Cryptography organizations
12.27. Diplomatic Wireless Service
link
nosplit
Cryptography organizations
12.28. Dundee Society
link
nosplit
Cryptography organizations
12.29. ECRYPT
link
nosplit
Cryptography organizations
12.30. FAPSI
link
nosplit
Cryptography organizations
12.31. Far East Combined Bureau
link
nosplit
Cryptography organizations
12.32. Finnish Defence Intelligence Agency
link
nosplit
Cryptography organizations
12.33. Fleet Radio Unit
link
nosplit
Cryptography organizations
12.34. Fleet Radio Unit, Melbourne
link
nosplit
Cryptography organizations
12.35. GCHQ
link
nosplit
Cryptography organizations
12.36. GCHQ Bude
link
nosplit
Cryptography organizations
12.37. General der Nachrichtenaufklärung
link
nosplit
Cryptography organizations
12.38. General der Nachrichtenaufklärung Training Referat
link
nosplit
Cryptography organizations
12.39. HM Government Communications Centre
link
nosplit
Cryptography organizations
12.40. Hut 3
link
nosplit
Cryptography organizations
12.41. Hut 4
link
nosplit
Cryptography organizations
12.42. Hut 6
link
nosplit
Cryptography organizations
12.43. Hut 7
link
nosplit
Cryptography organizations
12.44. Hut 8
link
nosplit
Cryptography organizations
12.45. International Association for Cryptologic Research
link
nosplit
Cryptography organizations
12.46. Luftnachrichten Abteilung 350
link
nosplit
Cryptography organizations
12.47. MI1
link
nosplit
Cryptography organizations
12.48. MI8
link
nosplit
Cryptography organizations
12.49. Military Intelligence Service (United States)
link
nosplit
Cryptography organizations
12.50. National Cryptologic Museum
link
nosplit
Cryptography organizations
12.51. National Cyber Security Centre (Ireland)
link
nosplit
Cryptography organizations
12.52. National Defence Radio Establishment
link
nosplit
Cryptography organizations
12.53. National Institute of Standards and Technology
link
nosplit
Cryptography organizations
12.54. National Vigilance Park
link
nosplit
Cryptography organizations
12.55. Naval Security Group
link
nosplit
Cryptography organizations
12.56. OP-20-G
link
nosplit
Cryptography organizations
12.57. On the roof gang
link
nosplit
Cryptography organizations
12.58. Operation Stella Polaris
link
nosplit
Cryptography organizations
12.59. PC Bruno
link
nosplit
Cryptography organizations
12.60. Pers Z S
link
nosplit
Cryptography organizations
12.61. RSA Security
link
nosplit
Cryptography organizations
12.62. Radio Battalion
link
nosplit
Cryptography organizations
12.63. Radio Reconnaissance Platoon
link
nosplit
Cryptography organizations
12.64. Research Office of the Reich Air Ministry
link
nosplit
Cryptography organizations
12.65. Ritchie Boys
link
nosplit
Cryptography organizations
12.66. Room 40
link
nosplit
Cryptography organizations
12.67. SECG
link
nosplit
Cryptography organizations
12.68. Secure Communication based on Quantum Cryptography
link
nosplit
Cryptography organizations
12.69. Signal Intelligence Service
link
nosplit
Cryptography organizations
12.70. Special Communications Service of Russia
link
nosplit
Cryptography organizations
12.71. Station CAST
link
nosplit
Cryptography organizations
12.72. Station HYPO
link
nosplit
Cryptography organizations
12.73. United States Coast Guard Unit 387 Cryptanalysis Unit
link
nosplit
Cryptography organizations
12.74. Wireless Experimental Centre
link
nosplit
Cryptography organizations
12.75. Women in Bletchley Park
link
nosplit
Cryptography organizations
12.76. Y service
link
nosplit
Cryptography organizations
13. Cryptography publications
link
nosplit
Cryptography
8
13.1. Cryptography books
link
nosplit
Cryptography publications
13.2. Cryptography in fiction
link
nosplit
Cryptography publications
13.3. Cryptography journals
link
nosplit
Cryptography publications
13.4. Communication Theory of Secrecy Systems
link
nosplit
Cryptography publications
13.5. Encyclopedia of Cryptography and Security
link
nosplit
Cryptography publications
13.6. National Information Assurance Glossary
link
nosplit
Cryptography publications
13.7. National Security Agency academic publications
link
nosplit
Cryptography publications
13.8. Walsh Report (cryptography)
link
nosplit
Cryptography publications
14. Cryptography standards
link
nosplit
Cryptography
46
14.1. Digital rights management standards
link
nosplit
Cryptography standards
14.2. ABA digital signature guidelines
link
nosplit
Cryptography standards
14.3. Advanced electronic signature
link
nosplit
Cryptography standards
14.4. Associated Signature Containers
link
nosplit
Cryptography standards
14.5. CAdES (computing)
link
nosplit
Cryptography standards
14.6. CRYPTREC
link
nosplit
Cryptography standards
14.7. Canonical XML
link
nosplit
Cryptography standards
14.8. Certificate signing request
link
nosplit
Cryptography standards
14.9. Commercial National Security Algorithm Suite
link
nosplit
Cryptography standards
14.10. Cryptographic Module Validation Program
link
nosplit
Cryptography standards
14.11. DigiDoc
link
nosplit
Cryptography standards
14.12. EIDAS
link
nosplit
Cryptography standards
14.13. European Information Technologies Certification
link
nosplit
Cryptography standards
14.14. European Information Technologies Certification Academy
link
nosplit
Cryptography standards
14.15. FIPS 140
link
nosplit
Cryptography standards
14.16. FIPS 140-2
link
nosplit
Cryptography standards
14.17. FIPS 140-3
link
nosplit
Cryptography standards
14.18. H.234
link
nosplit
Cryptography standards
14.19. IEEE 802.1AE
link
nosplit
Cryptography standards
14.20. IEEE P1363
link
nosplit
Cryptography standards
14.21. IEEE P1619
link
nosplit
Cryptography standards
14.22. ISO/IEC 18014
link
nosplit
Cryptography standards
14.23. ISO 19092-2
link
nosplit
Cryptography standards
14.24. NSA Suite A Cryptography
link
nosplit
Cryptography standards
14.25. NSA Suite B Cryptography
link
nosplit
Cryptography standards
14.26. P-384
link
nosplit
Cryptography standards
14.27. PAdES
link
nosplit
Cryptography standards
14.28. PBKDF2
link
nosplit
Cryptography standards
14.29. PKCS
link
nosplit
Cryptography standards
14.30. PKCS 1
link
nosplit
Cryptography standards
14.31. PKCS 11
link
nosplit
Cryptography standards
14.32. PKCS 12
link
nosplit
Cryptography standards
14.33. PKCS 7
link
nosplit
Cryptography standards
14.34. PKCS 8
link
nosplit
Cryptography standards
14.35. Qualified digital certificate
link
nosplit
Cryptography standards
14.36. Qualified electronic signature
link
nosplit
Cryptography standards
14.37. Qualified website authentication certificate
link
nosplit
Cryptography standards
14.38. SM9 (cryptography standard)
link
nosplit
Cryptography standards
14.39. Secure signature creation device
link
nosplit
Cryptography standards
14.40. Trust service provider
link
nosplit
Cryptography standards
14.41. Trusted Data Format
link
nosplit
Cryptography standards
14.42. Web Cryptography API
link
nosplit
Cryptography standards
14.43. XAdES
link
nosplit
Cryptography standards
14.44. XML Encryption
link
nosplit
Cryptography standards
14.45. XML Signature
link
nosplit
Cryptography standards
14.46. ZertES
link
nosplit
Cryptography standards
15. Cryptography stubs
link
nosplit
Cryptography
215
15.1. A-1 (code)
link
nosplit
Cryptography stubs
15.2. ABC (stream cipher)
link
nosplit
Cryptography stubs
15.3. ANDVT
link
nosplit
Cryptography stubs
15.4. Access structure
link
nosplit
Cryptography stubs
15.5. Acme Commodity and Phrase Code
link
nosplit
Cryptography stubs
15.6. Adiantum (cipher)
link
nosplit
Cryptography stubs
15.7. Ascon (cipher)
link
nosplit
Cryptography stubs
15.8. Audrey Ruth Briggs
link
nosplit
Cryptography stubs
15.9. BEAR and LION ciphers
link
nosplit
Cryptography stubs
15.10. BID 150
link
nosplit
Cryptography stubs
15.11. Bar mitzvah attack
link
nosplit
Cryptography stubs
15.12. Blum–Micali algorithm
link
nosplit
Cryptography stubs
15.13. Brute Force: Cracking the Data Encryption Standard
link
nosplit
Cryptography stubs
15.14. CAST-256
link
nosplit
Cryptography stubs
15.15. CIKS-1
link
nosplit
Cryptography stubs
15.16. CJCSG
link
nosplit
Cryptography stubs
15.17. CLEFIA
link
nosplit
Cryptography stubs
15.18. CRYPTON
link
nosplit
Cryptography stubs
15.19. CS-Cipher
link
nosplit
Cryptography stubs
15.20. CWC mode
link
nosplit
Cryptography stubs
15.21. Capstone (cryptography)
link
nosplit
Cryptography stubs
15.22. Card Verifiable Certificate
link
nosplit
Cryptography stubs
15.23. Certification on demand
link
nosplit
Cryptography stubs
15.24. Chaos communications
link
nosplit
Cryptography stubs
15.25. Chaos machine
link
nosplit
Cryptography stubs
15.26. Ciphr
link
nosplit
Cryptography stubs
15.27. Client certificate
link
nosplit
Cryptography stubs
15.28. Common reference string model
link
nosplit
Cryptography stubs
15.29. Communications Machine
link
nosplit
Cryptography stubs
15.30. Concrete security
link
nosplit
Cryptography stubs
15.31. Controlled Cryptographic Item
link
nosplit
Cryptography stubs
15.32. Crab (cipher)
link
nosplit
Cryptography stubs
15.33. CryptMT
link
nosplit
Cryptography stubs
15.34. Crypto-1
link
nosplit
Cryptography stubs
15.35. Crypto (book)
link
nosplit
Cryptography stubs
15.36. Crypto Leaks
link
nosplit
Cryptography stubs
15.37. Cryptographic Quarterly
link
nosplit
Cryptography stubs
15.38. Cryptographic log on
link
nosplit
Cryptography stubs
15.39. Cryptographie indéchiffrable
link
nosplit
Cryptography stubs
15.40. Cryptography Research
link
nosplit
Cryptography stubs
15.41. Cryptography newsgroups
link
nosplit
Cryptography stubs
15.42. Cryptologia
link
nosplit
Cryptography stubs
15.43. Cryptology ePrint Archive
link
nosplit
Cryptography stubs
15.44. Cryptomenysis Patefacta
link
nosplit
Cryptography stubs
15.45. Cryptoperiod
link
nosplit
Cryptography stubs
15.46. DEAL
link
nosplit
Cryptography stubs
15.47. DECIM
link
nosplit
Cryptography stubs
15.48. DICING
link
nosplit
Cryptography stubs
15.49. Data Authentication Algorithm
link
nosplit
Cryptography stubs
15.50. Decorrelation theory
link
nosplit
Cryptography stubs
15.51. Detached signature
link
nosplit
Cryptography stubs
15.52. Differential fault analysis
link
nosplit
Cryptography stubs
15.53. Digital Signature Standard
link
nosplit
Cryptography stubs
15.54. Digital signature forgery
link
nosplit
Cryptography stubs
15.55. Distribution ensemble
link
nosplit
Cryptography stubs
15.56. Doug Stinson
link
nosplit
Cryptography stubs
15.57. Dragon (cipher)
link
nosplit
Cryptography stubs
15.58. Dusting attack
link
nosplit
Cryptography stubs
15.59. Dynamic secrets
link
nosplit
Cryptography stubs
15.60. EnRUPT
link
nosplit
Cryptography stubs
15.61. Ephemeral key
link
nosplit
Cryptography stubs
15.62. EuroCrypt
link
nosplit
Cryptography stubs
15.63. Even code
link
nosplit
Cryptography stubs
15.64. Export of cryptography
link
nosplit
Cryptography stubs
15.65. Extendable-output function
link
nosplit
Cryptography stubs
15.66. F-FCSR
link
nosplit
Cryptography stubs
15.67. FASCINATOR
link
nosplit
Cryptography stubs
15.68. FEA-M
link
nosplit
Cryptography stubs
15.69. FISH (cipher)
link
nosplit
Cryptography stubs
15.70. FORK-256
link
nosplit
Cryptography stubs
15.71. Falcon (signature scheme)
link
nosplit
Cryptography stubs
15.72. Frogbit (cipher)
link
nosplit
Cryptography stubs
15.73. Full Domain Hash
link
nosplit
Cryptography stubs
15.74. GBDE
link
nosplit
Cryptography stubs
15.75. GGH signature scheme
link
nosplit
Cryptography stubs
15.76. Geli (software)
link
nosplit
Cryptography stubs
15.77. Generic group model
link
nosplit
Cryptography stubs
15.78. Group-based cryptography
link
nosplit
Cryptography stubs
15.79. Grøstl
link
nosplit
Cryptography stubs
15.80. HAIFA construction
link
nosplit
Cryptography stubs
15.81. HAS-160
link
nosplit
Cryptography stubs
15.82. HAS-V
link
nosplit
Cryptography stubs
15.83. HAVAL
link
nosplit
Cryptography stubs
15.84. HC-256
link
nosplit
Cryptography stubs
15.85. HX-63
link
nosplit
Cryptography stubs
15.86. Hermes8
link
nosplit
Cryptography stubs
15.87. Horton principle
link
nosplit
Cryptography stubs
15.88. IDEA NXT
link
nosplit
Cryptography stubs
15.89. ISO/IEC 10116
link
nosplit
Cryptography stubs
15.90. Initiative for Open Authentication
link
nosplit
Cryptography stubs
15.91. Iraqi block cipher
link
nosplit
Cryptography stubs
15.92. JADE (cipher machine)
link
nosplit
Cryptography stubs
15.93. JH (hash function)
link
nosplit
Cryptography stubs
15.94. Japanese M-1 cipher machine
link
nosplit
Cryptography stubs
15.95. Journal of Cryptology
link
nosplit
Cryptography stubs
15.96. KCDSA
link
nosplit
Cryptography stubs
15.97. KCipher-2
link
nosplit
Cryptography stubs
15.98. KL-43
link
nosplit
Cryptography stubs
15.99. KL-51
link
nosplit
Cryptography stubs
15.100. KOV-14
link
nosplit
Cryptography stubs
15.101. KOV-21
link
nosplit
Cryptography stubs
15.102. KSD-64
link
nosplit
Cryptography stubs
15.103. KSV-21
link
nosplit
Cryptography stubs
15.104. KY-58
link
nosplit
Cryptography stubs
15.105. KY-68
link
nosplit
Cryptography stubs
15.106. Key clustering
link
nosplit
Cryptography stubs
15.107. Key generator
link
nosplit
Cryptography stubs
15.108. Key signature (cryptography)
link
nosplit
Cryptography stubs
15.109. Key signing party
link
nosplit
Cryptography stubs
15.110. Keysigning
link
nosplit
Cryptography stubs
15.111. Kmc-Subset137
link
nosplit
Cryptography stubs
15.112. Kryptographik
link
nosplit
Cryptography stubs
15.113. LEVIATHAN (cipher)
link
nosplit
Cryptography stubs
15.114. LEX (cipher)
link
nosplit
Cryptography stubs
15.115. LILI-128
link
nosplit
Cryptography stubs
15.116. Ladder-DES
link
nosplit
Cryptography stubs
15.117. Lane (hash function)
link
nosplit
Cryptography stubs
15.118. M6 (cipher)
link
nosplit
Cryptography stubs
15.119. M8 (cipher)
link
nosplit
Cryptography stubs
15.120. MAG (cipher)
link
nosplit
Cryptography stubs
15.121. MESH (cipher)
link
nosplit
Cryptography stubs
15.122. MICKEY
link
nosplit
Cryptography stubs
15.123. MMB (cipher)
link
nosplit
Cryptography stubs
15.124. Matt Curtin
link
nosplit
Cryptography stubs
15.125. Mercy (cipher)
link
nosplit
Cryptography stubs
15.126. Mimic function
link
nosplit
Cryptography stubs
15.127. Mir-1
link
nosplit
Cryptography stubs
15.128. MultiSwap
link
nosplit
Cryptography stubs
15.129. N-hash
link
nosplit
Cryptography stubs
15.130. NESTOR (encryption)
link
nosplit
Cryptography stubs
15.131. NLS (cipher)
link
nosplit
Cryptography stubs
15.132. NUSH
link
nosplit
Cryptography stubs
15.133. NaSHA
link
nosplit
Cryptography stubs
15.134. National Institute of Cryptology Research and Development
link
nosplit
Cryptography stubs
15.135. Navajo I
link
nosplit
Cryptography stubs
15.136. New Data Seal
link
nosplit
Cryptography stubs
15.137. Nimbus (cipher)
link
nosplit
Cryptography stubs
15.138. Nonlinear-feedback shift register
link
nosplit
Cryptography stubs
15.139. Null encryption
link
nosplit
Cryptography stubs
15.140. OPIE Authentication System
link
nosplit
Cryptography stubs
15.141. ORYX
link
nosplit
Cryptography stubs
15.142. Open Media Commons
link
nosplit
Cryptography stubs
15.143. Oracle attack
link
nosplit
Cryptography stubs
15.144. PC1 cipher
link
nosplit
Cryptography stubs
15.145. PMAC (cryptography)
link
nosplit
Cryptography stubs
15.146. Paper key
link
nosplit
Cryptography stubs
15.147. Pass (software)
link
nosplit
Cryptography stubs
15.148. Permutation box
link
nosplit
Cryptography stubs
15.149. Petname
link
nosplit
Cryptography stubs
15.150. Pike (cipher)
link
nosplit
Cryptography stubs
15.151. Pointcheval–Stern signature algorithm
link
nosplit
Cryptography stubs
15.152. Polar Bear (cipher)
link
nosplit
Cryptography stubs
15.153. Polyinstantiation
link
nosplit
Cryptography stubs
15.154. Product cipher
link
nosplit
Cryptography stubs
15.155. Pseudo-Hadamard transform
link
nosplit
Cryptography stubs
15.156. REDOC
link
nosplit
Cryptography stubs
15.157. Reeds–Sloane algorithm
link
nosplit
Cryptography stubs
15.158. Reflector (cipher machine)
link
nosplit
Cryptography stubs
15.159. Rekeying (cryptography)
link
nosplit
Cryptography stubs
15.160. Rockex
link
nosplit
Cryptography stubs
15.161. S-1 block cipher
link
nosplit
Cryptography stubs
15.162. SAVILLE
link
nosplit
Cryptography stubs
15.163. SC2000
link
nosplit
Cryptography stubs
15.164. SEAL (cipher)
link
nosplit
Cryptography stubs
15.165. SHARK
link
nosplit
Cryptography stubs
15.166. SIGTOT
link
nosplit
Cryptography stubs
15.167. SMASH (hash)
link
nosplit
Cryptography stubs
15.168. SOBER-128
link
nosplit
Cryptography stubs
15.169. SOSEMANUK
link
nosplit
Cryptography stubs
15.170. SSS (cipher)
link
nosplit
Cryptography stubs
15.171. STU-I
link
nosplit
Cryptography stubs
15.172. SXAL/MBAL
link
nosplit
Cryptography stubs
15.173. Schnorr group
link
nosplit
Cryptography stubs
15.174. Scream (cipher)
link
nosplit
Cryptography stubs
15.175. Secure access module
link
nosplit
Cryptography stubs
15.176. Selected Areas in Cryptography
link
nosplit
Cryptography stubs
15.177. Shackle code
link
nosplit
Cryptography stubs
15.178. Slidex
link
nosplit
Cryptography stubs
15.179. Smart cow problem
link
nosplit
Cryptography stubs
15.180. Snefru
link
nosplit
Cryptography stubs
15.181. Spectr-H64
link
nosplit
Cryptography stubs
15.182. Spectral Hash
link
nosplit
Cryptography stubs
15.183. Square (cipher)
link
nosplit
Cryptography stubs
15.184. Standard model (cryptography)
link
nosplit
Cryptography stubs
15.185. StegFS
link
nosplit
Cryptography stubs
15.186. Strong RSA assumption
link
nosplit
Cryptography stubs
15.187. Sub-group hiding
link
nosplit
Cryptography stubs
15.188. Subject Alternative Name
link
nosplit
Cryptography stubs
15.189. Switchover
link
nosplit
Cryptography stubs
15.190. TRBDK3 YAEA
link
nosplit
Cryptography stubs
15.191. TSC-3
link
nosplit
Cryptography stubs
15.192. Tate pairing
link
nosplit
Cryptography stubs
15.193. The American Black Chamber
link
nosplit
Cryptography stubs
15.194. Time-based authentication
link
nosplit
Cryptography stubs
15.195. Torus-based cryptography
link
nosplit
Cryptography stubs
15.196. Treyfer
link
nosplit
Cryptography stubs
15.197. Trustico
link
nosplit
Cryptography stubs
15.198. Turing (cipher)
link
nosplit
Cryptography stubs
15.199. Two-Track-MAC
link
nosplit
Cryptography stubs
15.200. U-229
link
nosplit
Cryptography stubs
15.201. U-Key
link
nosplit
Cryptography stubs
15.202. U-Prove
link
nosplit
Cryptography stubs
15.203. UES (cipher)
link
nosplit
Cryptography stubs
15.204. VINSON
link
nosplit
Cryptography stubs
15.205. Variably Modified Permutation Composition
link
nosplit
Cryptography stubs
15.206. WAKE (cipher)
link
nosplit
Cryptography stubs
15.207. WG (cipher)
link
nosplit
Cryptography stubs
15.208. Wireless Public Key Infrastructure
link
nosplit
Cryptography stubs
15.209. Witness-indistinguishable proof
link
nosplit
Cryptography stubs
15.210. Woo–Lam
link
nosplit
Cryptography stubs
15.211. Xor–encrypt–xor
link
nosplit
Cryptography stubs
15.212. Yamb
link
nosplit
Cryptography stubs
15.213. ZUC stream cipher
link
nosplit
Cryptography stubs
15.214. Zero-knowledge password proof
link
nosplit
Cryptography stubs
15.215. Zodiac (cipher)
link
nosplit
Cryptography stubs
16. Cryptologic education
link
nosplit
Cryptography
4
16.1. Agostino Amadi
link
nosplit
Cryptologic education
16.2. Boaz Tsaban
link
nosplit
Cryptologic education
16.3. Julia Ward
link
nosplit
Cryptologic education
16.4. National Cryptologic School
link
nosplit
Cryptologic education
17. Disk encryption
link
nosplit
Cryptography
8
17.1. Cold boot attack
link
nosplit
Disk encryption
17.2. Disk encryption theory
link
nosplit
Disk encryption
17.3. EncFS
link
nosplit
Disk encryption
17.4. In re Boucher
link
nosplit
Disk encryption
17.5. TRESOR
link
nosplit
Disk encryption
17.6. Transparent data encryption
link
nosplit
Disk encryption
17.7. USB flash drive security
link
nosplit
Disk encryption
17.8. United States v. Fricosu
link
nosplit
Disk encryption
18. History of cryptography
link
nosplit
Cryptography
87
18.1. Code talkers
link
nosplit
History of cryptography
18.2. Riverbank Laboratories
link
nosplit
History of cryptography
18.3. Rotor machines
link
nosplit
History of cryptography
18.4. Signals intelligence of World War I
link
nosplit
History of cryptography
18.5. Signals intelligence of World War II
link
nosplit
History of cryptography
18.6. Undeciphered historical codes and ciphers
link
nosplit
History of cryptography
18.7. World War II Japanese cryptography
link
nosplit
History of cryptography
18.8. 40-bit encryption
link
nosplit
History of cryptography
18.9. 56-bit encryption
link
nosplit
History of cryptography
18.10. ANOM
link
nosplit
History of cryptography
18.11. Al-Kindi
link
nosplit
History of cryptography
18.12. Apple–FBI encryption dispute
link
nosplit
History of cryptography
18.13. BATCO
link
nosplit
History of cryptography
18.14. Babington Plot
link
nosplit
History of cryptography
18.15. Battle of Midway
link
nosplit
History of cryptography
18.16. Beale ciphers
link
nosplit
History of cryptography
18.17. CAVNET
link
nosplit
History of cryptography
18.18. Card catalog (cryptology)
link
nosplit
History of cryptography
18.19. Central Bureau
link
nosplit
History of cryptography
18.20. Choctaw code talkers
link
nosplit
History of cryptography
18.21. Clipper chip
link
nosplit
History of cryptography
18.22. Code-O-Graph
link
nosplit
History of cryptography
18.23. Code-talker paradox
link
nosplit
History of cryptography
18.24. Code Girls
link
nosplit
History of cryptography
18.25. Code talker
link
nosplit
History of cryptography
18.26. Commercial code (communications)
link
nosplit
History of cryptography
18.27. Content Scramble System
link
nosplit
History of cryptography
18.28. Copiale cipher
link
nosplit
History of cryptography
18.29. Cryptanalysis of the Enigma
link
nosplit
History of cryptography
18.30. Cryptanalysis of the Lorenz cipher
link
nosplit
History of cryptography
18.31. Crypto Wars
link
nosplit
History of cryptography
18.32. Cryptogram
link
nosplit
History of cryptography
18.33. Cyrillic Projector
link
nosplit
History of cryptography
18.34. Dorabella Cipher
link
nosplit
History of cryptography
18.35. Encryption by date
link
nosplit
History of cryptography
18.36. Erich Hüttenhain
link
nosplit
History of cryptography
18.37. Ferdinand Voegele
link
nosplit
History of cryptography
18.38. German Army cryptographic systems of World War II
link
nosplit
History of cryptography
18.39. German submarine U-505
link
nosplit
History of cryptography
18.40. Grill (cryptology)
link
nosplit
History of cryptography
18.41. Gulf of Tonkin incident
link
nosplit
History of cryptography
18.42. Japanese army and diplomatic codes
link
nosplit
History of cryptography
18.43. Japanese cryptology from the 1500s to Meiji
link
nosplit
History of cryptography
18.44. Japanese naval codes
link
nosplit
History of cryptography
18.45. Kryptos
link
nosplit
History of cryptography
18.46. Lavabit
link
nosplit
History of cryptography
18.47. Magic (cryptography)
link
nosplit
History of cryptography
18.48. Michel de Castelnau
link
nosplit
History of cryptography
18.49. Mlecchita vikalpa
link
nosplit
History of cryptography
18.50. Mulabhadra
link
nosplit
History of cryptography
18.51. NSAKEY
link
nosplit
History of cryptography
18.52. Notarikon
link
nosplit
History of cryptography
18.53. Operation CHAOS
link
nosplit
History of cryptography
18.54. Operation Ruthless
link
nosplit
History of cryptography
18.55. Peter Novopashenny
link
nosplit
History of cryptography
18.56. Poem code
link
nosplit
History of cryptography
18.57. Polish Enigma double
link
nosplit
History of cryptography
18.58. Polygraphia Nova
link
nosplit
History of cryptography
18.59. Project MERRIMAC
link
nosplit
History of cryptography
18.60. RAF raid on La Caine (1944)
link
nosplit
History of cryptography
18.61. Rasterschlüssel 44
link
nosplit
History of cryptography
18.62. Room 641A
link
nosplit
History of cryptography
18.63. Rudolf Bailovic
link
nosplit
History of cryptography
18.64. SMS Magdeburg
link
nosplit
History of cryptography
18.65. Secret decoder ring
link
nosplit
History of cryptography
18.66. Shugborough inscription
link
nosplit
History of cryptography
18.67. Smithy code
link
nosplit
History of cryptography
18.68. Substitution cipher
link
nosplit
History of cryptography
18.69. Syllabical and Steganographical Table
link
nosplit
History of cryptography
18.70. TICOM
link
nosplit
History of cryptography
18.71. The Alphabet Cipher
link
nosplit
History of cryptography
18.72. The Codebreakers
link
nosplit
History of cryptography
18.73. The Magic Words are Squeamish Ossifrage
link
nosplit
History of cryptography
18.74. The world wonders
link
nosplit
History of cryptography
18.75. Trench code
link
nosplit
History of cryptography
18.76. USS Liberty incident
link
nosplit
History of cryptography
18.77. USS Pueblo (AGER-2)
link
nosplit
History of cryptography
18.78. United States Naval Computing Machine Laboratory
link
nosplit
History of cryptography
18.79. Venona project
link
nosplit
History of cryptography
18.80. Voynich manuscript
link
nosplit
History of cryptography
18.81. Walter Fricke
link
nosplit
History of cryptography
18.82. Wilhelm Fenner
link
nosplit
History of cryptography
18.83. Wilhelm Tranow
link
nosplit
History of cryptography
18.84. William Blair (surgeon)
link
nosplit
History of cryptography
18.85. World War II cryptography
link
nosplit
History of cryptography
18.86. World War I cryptography
link
nosplit
History of cryptography
18.87. Zimmermann Telegram
link
nosplit
History of cryptography
19. Key management
link
nosplit
Cryptography
63
19.1. Key derivation functions
link
nosplit
Key management
19.2. Key pre-distribution
link
nosplit
Key management
19.3. AES key schedule
link
nosplit
Key management
19.4. AN/PYQ-10
link
nosplit
Key management
19.5. ASC X9
link
nosplit
Key management
19.6. Authenticated Key Exchange
link
nosplit
Key management
19.7. Blom's scheme
link
nosplit
Key management
19.8. CA/Browser Forum
link
nosplit
Key management
19.9. Certificate authority
link
nosplit
Key management
19.10. Certificate policy
link
nosplit
Key management
19.11. Certificate revocation list
link
nosplit
Key management
19.12. Certification Practice Statement
link
nosplit
Key management
19.13. Computational trust
link
nosplit
Key management
19.14. Crypto-shredding
link
nosplit
Key management
19.15. Cryptographic key types
link
nosplit
Key management
19.16. DNS-based Authentication of Named Entities
link
nosplit
Key management
19.17. Derived unique key per transaction
link
nosplit
Key management
19.18. Domain-validated certificate
link
nosplit
Key management
19.19. Domain Name System Security Extensions
link
nosplit
Key management
19.20. Extended Validation Certificate
link
nosplit
Key management
19.21. Fill device
link
nosplit
Key management
19.22. Forward secrecy
link
nosplit
Key management
19.23. GateKeeper (access control device)
link
nosplit
Key management
19.24. KIK-30
link
nosplit
Key management
19.25. KYK-13
link
nosplit
Key management
19.26. Key (cryptography)
link
nosplit
Key management
19.27. Key authentication
link
nosplit
Key management
19.28. Key ceremony
link
nosplit
Key management
19.29. Key checksum value
link
nosplit
Key management
19.30. Key derivation function
link
nosplit
Key management
19.31. Key distribution
link
nosplit
Key management
19.32. Key distribution center
link
nosplit
Key management
19.33. Key distribution in wireless sensor networks
link
nosplit
Key management
19.34. Key encapsulation mechanism
link
nosplit
Key management
19.35. Key escrow
link
nosplit
Key management
19.36. Key generation
link
nosplit
Key management
19.37. Key server (cryptographic)
link
nosplit
Key management
19.38. Key size
link
nosplit
Key management
19.39. Key stretching
link
nosplit
Key management
19.40. Key whitening
link
nosplit
Key management
19.41. Keybase
link
nosplit
Key management
19.42. Keyfile
link
nosplit
Key management
19.43. Media Key Block
link
nosplit
Key management
19.44. Offline root certificate authority
link
nosplit
Key management
19.45. OpenIKED
link
nosplit
Key management
19.46. Pre-shared key
link
nosplit
Key management
19.47. Public key certificate
link
nosplit
Key management
19.48. Public key infrastructure
link
nosplit
Key management
19.49. SSHFP record
link
nosplit
Key management
19.50. Secure key issuing cryptography
link
nosplit
Key management
19.51. Self-signed certificate
link
nosplit
Key management
19.52. Session key
link
nosplit
Key management
19.53. Shared secret
link
nosplit
Key management
19.54. Signal operating instructions
link
nosplit
Key management
19.55. Simple Key-Management for Internet Protocol
link
nosplit
Key management
19.56. Simple public-key infrastructure
link
nosplit
Key management
19.57. Static key
link
nosplit
Key management
19.58. Ticket Granting Ticket
link
nosplit
Key management
19.59. Trust anchor
link
nosplit
Key management
19.60. Validation authority
link
nosplit
Key management
19.61. Web of trust
link
nosplit
Key management
19.62. Wildcard certificate
link
nosplit
Key management
19.63. Zeroisation
link
nosplit
Key management
20. National Security Agency cryptography
link
nosplit
Cryptography
9
20.1. Data Encryption Standard
link
nosplit
National Security Agency cryptography
20.2. National Security Agency encryption devices
link
nosplit
National Security Agency cryptography
20.3. Martin and Mitchell defection
link
nosplit
National Security Agency cryptography
20.4. Mary Hughes Budenbach
link
nosplit
National Security Agency cryptography
20.5. Multiprogram Research Facility
link
nosplit
National Security Agency cryptography
20.6. NSA cryptography
link
nosplit
National Security Agency cryptography
20.7. Simon (cipher)
link
nosplit
National Security Agency cryptography
20.8. Skipjack (cipher)
link
nosplit
National Security Agency cryptography
20.9. Speck (cipher)
link
nosplit
National Security Agency cryptography
21. Public-key cryptography
link
nosplit
Cryptography
41
21.1. Pairing-based cryptography
link
nosplit
Public-key cryptography
21.2. Post-quantum cryptography
link
nosplit
Public-key cryptography
21.3. Anonymous veto network
link
nosplit
Public-key cryptography
21.4. Attribute-based encryption
link
nosplit
Public-key cryptography
21.5. Authorization certificate
link
nosplit
Public-key cryptography
21.6. BLISS signature scheme
link
nosplit
Public-key cryptography
21.7. Blind signature
link
nosplit
Public-key cryptography
21.8. Certificate-based encryption
link
nosplit
Public-key cryptography
21.9. Certificateless cryptography
link
nosplit
Public-key cryptography
21.10. Chain of trust
link
nosplit
Public-key cryptography
21.11. Cohen's cryptosystem
link
nosplit
Public-key cryptography
21.12. Diffie–Hellman key exchange
link
nosplit
Public-key cryptography
21.13. Digital Signature Algorithm
link
nosplit
Public-key cryptography
21.14. Distributed key generation
link
nosplit
Public-key cryptography
21.15. EdDSA
link
nosplit
Public-key cryptography
21.16. Elliptic-curve cryptography
link
nosplit
Public-key cryptography
21.17. Elliptic Curve Digital Signature Algorithm
link
nosplit
Public-key cryptography
21.18. Hash-based cryptography
link
nosplit
Public-key cryptography
21.19. Hyperelliptic curve cryptography
link
nosplit
Public-key cryptography
21.20. Identity-based conditional proxy re-encryption
link
nosplit
Public-key cryptography
21.21. Identity-based cryptography
link
nosplit
Public-key cryptography
21.22. Identity-based encryption
link
nosplit
Public-key cryptography
21.23. Implicit certificate
link
nosplit
Public-key cryptography
21.24. Java KeyStore
link
nosplit
Public-key cryptography
21.25. Jeevan Pramaan
link
nosplit
Public-key cryptography
21.26. Merkle signature scheme
link
nosplit
Public-key cryptography
21.27. Non-commutative cryptography
link
nosplit
Public-key cryptography
21.28. Non-repudiation
link
nosplit
Public-key cryptography
21.29. OneID
link
nosplit
Public-key cryptography
21.30. Open vote network
link
nosplit
Public-key cryptography
21.31. Proxy re-encryption
link
nosplit
Public-key cryptography
21.32. RSA problem
link
nosplit
Public-key cryptography
21.33. Resource Public Key Infrastructure
link
nosplit
Public-key cryptography
21.34. Ring signature
link
nosplit
Public-key cryptography
21.35. Signcryption
link
nosplit
Public-key cryptography
21.36. Smart card management system
link
nosplit
Public-key cryptography
21.37. Teleadministration
link
nosplit
Public-key cryptography
21.38. Threshold cryptosystem
link
nosplit
Public-key cryptography
21.39. Transient-key cryptography
link
nosplit
Public-key cryptography
21.40. Trusted third party
link
nosplit
Public-key cryptography
21.41. XUDA
link
nosplit
Public-key cryptography
22. Security engineering
link
nosplit
Cryptography
46
22.1. Access control
link
nosplit
Security engineering
22.2. Engineering failures
link
nosplit
Security engineering
22.3. Locksmithing
link
nosplit
Security engineering
22.4. Perimeter security
link
nosplit
Security engineering
22.5. Prisons
link
nosplit
Security engineering
22.6. Secure communication
link
nosplit
Security engineering
22.7. Security equipment manufacturers
link
nosplit
Security engineering
22.8. Security technology
link
nosplit
Security engineering
22.9. 3D security
link
nosplit
Security engineering
22.10. Bank vault
link
nosplit
Security engineering
22.11. Closed-circuit television
link
nosplit
Security engineering
22.12. Crime-Free Multi-Housing
link
nosplit
Security engineering
22.13. Crime prevention through environmental design
link
nosplit
Security engineering
22.14. Cyber spying
link
nosplit
Security engineering
22.15. Cyberwarfare
link
nosplit
Security engineering
22.16. Dynamic Intelligent Currency Encryption
link
nosplit
Security engineering
22.17. Emergency Data Request
link
nosplit
Security engineering
22.18. European Programme for Critical Infrastructure Protection
link
nosplit
Security engineering
22.19. Failing badly
link
nosplit
Security engineering
22.20. Fortify Software
link
nosplit
Security engineering
22.21. Frederick S. Holmes
link
nosplit
Security engineering
22.22. Future Fibre Technologies
link
nosplit
Security engineering
22.23. Gated community
link
nosplit
Security engineering
22.24. Guard tour patrol system
link
nosplit
Security engineering
22.25. Hager Group
link
nosplit
Security engineering
22.26. High-voltage transformer fire barriers
link
nosplit
Security engineering
22.27. Identity document forgery
link
nosplit
Security engineering
22.28. Locked Shields
link
nosplit
Security engineering
22.29. National Infrastructure Protection Plan
link
nosplit
Security engineering
22.30. Natural surveillance
link
nosplit
Security engineering
22.31. Nightingale floor
link
nosplit
Security engineering
22.32. Pan–tilt–zoom camera
link
nosplit
Security engineering
22.33. Physical security
link
nosplit
Security engineering
22.34. Physical security information management
link
nosplit
Security engineering
22.35. Platform screen doors
link
nosplit
Security engineering
22.36. Presumed security
link
nosplit
Security engineering
22.37. Privacy engineering
link
nosplit
Security engineering
22.38. Proactive cyber defence
link
nosplit
Security engineering
22.39. Security operations center
link
nosplit
Security engineering
22.40. Security pattern
link
nosplit
Security engineering
22.41. Security smoke
link
nosplit
Security engineering
22.42. SmartWater
link
nosplit
Security engineering
22.43. Software security assurance
link
nosplit
Security engineering
22.44. Stealth Key
link
nosplit
Security engineering
22.45. Technical failure
link
nosplit
Security engineering
22.46. U.S. critical infrastructure protection
link
nosplit
Security engineering
23. Steganography
link
nosplit
Cryptography
20
23.1. 40-track mode
link
nosplit
Steganography
23.2. Aburidashi
link
nosplit
Steganography
23.3. BPCS-steganography
link
nosplit
Steganography
23.4. Bacon's cipher
link
nosplit
Steganography
23.5. Canary trap
link
nosplit
Steganography
23.6. Covert channel
link
nosplit
Steganography
23.7. Invisible ink
link
nosplit
Steganography
23.8. Johannes Trithemius
link
nosplit
Steganography
23.9. Machine Identification Code
link
nosplit
Steganography
23.10. Microdot
link
nosplit
Steganography
23.11. Microprinting
link
nosplit
Steganography
23.12. Null cipher
link
nosplit
Steganography
23.13. OutGuess
link
nosplit
Steganography
23.14. Peter Wayner
link
nosplit
Steganography
23.15. Polybius square
link
nosplit
Steganography
23.16. Polyglot (computing)
link
nosplit
Steganography
23.17. Security printing
link
nosplit
Steganography
23.18. Steganographia
link
nosplit
Steganography
23.19. Steganographic file system
link
nosplit
Steganography
23.20. StegoShare
link
nosplit
Steganography
24. Symmetric-key cryptography
link
nosplit
Cryptography
8
24.1. Authenticated encryption
link
nosplit
Symmetric-key cryptography
24.2. Avalanche effect
link
nosplit
Symmetric-key cryptography
24.3. Bent function
link
nosplit
Symmetric-key cryptography
24.4. Block size (cryptography)
link
nosplit
Symmetric-key cryptography
24.5. Collision resistance
link
nosplit
Symmetric-key cryptography
24.6. Confusion and diffusion
link
nosplit
Symmetric-key cryptography
24.7. Needham–Schroeder protocol
link
nosplit
Symmetric-key cryptography
24.8. Otway–Rees protocol
link
nosplit
Symmetric-key cryptography
25. Theory of cryptography
link
nosplit
Cryptography
26
25.1. Advantage (cryptography)
link
nosplit
Theory of cryptography
25.2. Averaging argument
link
nosplit
Theory of cryptography
25.3. Burrows–Abadi–Needham logic
link
nosplit
Theory of cryptography
25.4. Ciphertext indistinguishability
link
nosplit
Theory of cryptography
25.5. Claw-free permutation
link
nosplit
Theory of cryptography
25.6. Deterministic encryption
link
nosplit
Theory of cryptography
25.7. Differential privacy
link
nosplit
Theory of cryptography
25.8. Fiat–Shamir heuristic
link
nosplit
Theory of cryptography
25.9. Information-theoretic security
link
nosplit
Theory of cryptography
25.10. Leftover hash lemma
link
nosplit
Theory of cryptography
25.11. Local differential privacy
link
nosplit
Theory of cryptography
25.12. Neural cryptography
link
nosplit
Theory of cryptography
25.13. Non-interactive zero-knowledge proof
link
nosplit
Theory of cryptography
25.14. Plaintext-aware encryption
link
nosplit
Theory of cryptography
25.15. Probabilistic encryption
link
nosplit
Theory of cryptography
25.16. Provable security
link
nosplit
Theory of cryptography
25.17. Random oracle
link
nosplit
Theory of cryptography
25.18. Reconstruction attack
link
nosplit
Theory of cryptography
25.19. Semantic security
link
nosplit
Theory of cryptography
25.20. Semiprime
link
nosplit
Theory of cryptography
25.21. Socialist millionaire problem
link
nosplit
Theory of cryptography
25.22. Sponge function
link
nosplit
Theory of cryptography
25.23. Strong prime
link
nosplit
Theory of cryptography
25.24. Universal composability
link
nosplit
Theory of cryptography
25.25. Yao's Millionaires' problem
link
nosplit
Theory of cryptography
25.26. Zero-knowledge proof
link
nosplit
Theory of cryptography
26. 123 Reg
link
nosplit
Cryptography
27. Accumulator (cryptography)
link
nosplit
Cryptography
28. Adaptive Redaction
link
nosplit
Cryptography
29. Advanced Encryption Standard
link
nosplit
Cryptography
7
29.1. AES implementations
link
nosplit
Advanced Encryption Standard
29.2. AES instruction set
link
nosplit
Advanced Encryption Standard
29.3. Crypto-PAn
link
nosplit
Advanced Encryption Standard
29.4. Intel Cascade Cipher
link
nosplit
Advanced Encryption Standard
29.5. Poly1305
link
nosplit
Advanced Encryption Standard
29.6. Rijndael MixColumns
link
nosplit
Advanced Encryption Standard
29.7. Rijndael S-box
link
nosplit
Advanced Encryption Standard
30. Anonymous matching
link
nosplit
Cryptography
31. Anonymous remailer
link
nosplit
Cryptography
32. Array controller based encryption
link
nosplit
Cryptography
33. Backdoor (computing)
link
nosplit
Cryptography
34. Batch cryptography
link
nosplit
Cryptography
35. Bitcoin Gold
link
nosplit
Cryptography
36. Blacker (security)
link
nosplit
Cryptography
37. Blinding (cryptography)
link
nosplit
Cryptography
38. Blocknots
link
nosplit
Cryptography
39. Branch number
link
nosplit
Cryptography
40. Bring your own encryption
link
nosplit
Cryptography
41. Bus encryption
link
nosplit
Cryptography
42. Chaffing and winnowing
link
nosplit
Cryptography
43. Chaos Communication Congress
link
nosplit
Cryptography
44. Chaotic cryptology
link
nosplit
Cryptography
45. Cipher
link
nosplit
Cryptography
46. Ciphertext
link
nosplit
Cryptography
47. Ciphertext expansion
link
nosplit
Cryptography
48. Client-side encryption
link
nosplit
Cryptography
49. CloudMask
link
nosplit
Cryptography
50. Code (cryptography)
link
nosplit
Cryptography
51. Code word
link
nosplit
Cryptography
52. Codebook
link
nosplit
Cryptography
53. Codress message
link
nosplit
Cryptography
54. Colored Coins
link
nosplit
Cryptography
55. Communications security
link
nosplit
Cryptography
56. Completeness (cryptography)
link
nosplit
Cryptography
57. Computer security
link
nosplit
Cryptography
216
57.1. Cloud infrastructure attacks and failures
link
nosplit
Computer security
57.2. Computer access control
link
nosplit
Computer security
57.3. Computer forensics
link
nosplit
Computer security
57.4. Computer network security
link
nosplit
Computer security
57.5. Computer security by country
link
nosplit
Computer security
57.6. Computer security conferences
link
nosplit
Computer security
57.7. Computer security exploits
link
nosplit
Computer security
57.8. Computer security hardware
link
nosplit
Computer security
57.9. Computer security models
link
nosplit
Computer security
57.10. Computer security organizations
link
nosplit
Computer security
57.11. Computer security procedures
link
nosplit
Computer security
57.12. Computer security qualifications
link
nosplit
Computer security
57.13. Computer security software
link
nosplit
Computer security
57.14. Computer security standards
link
nosplit
Computer security
57.15. Computer security stubs
link
nosplit
Computer security
57.16. Computer surveillance
link
nosplit
Computer security
57.17. Data security
link
nosplit
Computer security
57.18. Electronic identification
link
nosplit
Computer security
57.19. IT risk management
link
nosplit
Computer security
57.20. InfoSec Twitter
link
nosplit
Computer security
57.21. Internet leaks
link
nosplit
Computer security
57.22. Mobile security
link
nosplit
Computer security
57.23. People associated with computer security
link
nosplit
Computer security
57.24. Security vulnerability databases
link
nosplit
Computer security
57.25. Software obfuscation
link
nosplit
Computer security
57.26. Works about computer security
link
nosplit
Computer security
57.27. Access level
link
nosplit
Computer security
57.28. Adrozek
link
nosplit
Computer security
57.29. Adversarial machine learning
link
nosplit
Computer security
57.30. Air India data breach
link
nosplit
Computer security
57.31. American Innovation and Competitiveness Act
link
nosplit
Computer security
57.32. Anderson's rule (computer science)
link
nosplit
Computer security
57.33. Anomaly Detection at Multiple Scales
link
nosplit
Computer security
57.34. Application portfolio attack surface
link
nosplit
Computer security
57.35. Aptum Technologies
link
nosplit
Computer security
57.36. Aurora Generator Test
link
nosplit
Computer security
57.37. Automotive security
link
nosplit
Computer security
57.38. BeyondCorp
link
nosplit
Computer security
57.39. Biometric device
link
nosplit
Computer security
57.40. BlueBorne (security vulnerability)
link
nosplit
Computer security
57.41. BlueHat
link
nosplit
Computer security
57.42. Blue team (computer security)
link
nosplit
Computer security
57.43. British Airways data breach
link
nosplit
Computer security
57.44. CPU modes
link
nosplit
Computer security
57.45. Camfecting
link
nosplit
Computer security
57.46. Capture the flag (cybersecurity)
link
nosplit
Computer security
57.47. Centurion guard
link
nosplit
Computer security
57.48. Ciscogate
link
nosplit
Computer security
57.49. Client honeypot
link
nosplit
Computer security
57.50. CloudPassage
link
nosplit
Computer security
57.51. Cloud computing security
link
nosplit
Computer security
57.52. Co-managed Security
link
nosplit
Computer security
57.53. Collaboration-oriented architecture
link
nosplit
Computer security
57.54. Collateral freedom
link
nosplit
Computer security
57.55. Commission on Enhancing National Cybersecurity
link
nosplit
Computer security
57.56. Computer Law & Security Review
link
nosplit
Computer security
57.57. Computer security compromised by hardware failure
link
nosplit
Computer security
57.58. Computer security incident management
link
nosplit
Computer security
57.59. Confused deputy problem
link
nosplit
Computer security
57.60. Content Disarm & Reconstruction
link
nosplit
Computer security
57.61. Content Threat Removal
link
nosplit
Computer security
57.62. Control-flow integrity
link
nosplit
Computer security
57.63. Cowrie (honeypot)
link
nosplit
Computer security
57.64. Crackme
link
nosplit
Computer security
57.65. Cure53
link
nosplit
Computer security
57.66. CyberPatriot
link
nosplit
Computer security
57.67. Cyber Discovery
link
nosplit
Computer security
57.68. Cyber Intelligence Sharing and Protection Act
link
nosplit
Computer security
57.69. Cyber Ireland
link
nosplit
Computer security
57.70. Cyber Resilience Act
link
nosplit
Computer security
57.71. Cyber Storm Exercise
link
nosplit
Computer security
57.72. Cyber Threat Intelligence Integration Center
link
nosplit
Computer security
57.73. Cyber and Information Domain Service
link
nosplit
Computer security
57.74. Cyber range
link
nosplit
Computer security
57.75. Cyber self-defense
link
nosplit
Computer security
57.76. Cyberbiosecurity
link
nosplit
Computer security
57.77. Cybercrime
link
nosplit
Computer security
57.78. Cybersecurity Information Sharing Act
link
nosplit
Computer security
57.79. Cybersex trafficking
link
nosplit
Computer security
57.80. DREAD (risk assessment model)
link
nosplit
Computer security
57.81. Dancing pigs
link
nosplit
Computer security
57.82. Data-centric security
link
nosplit
Computer security
57.83. Data commingling
link
nosplit
Computer security
57.84. Data remanence
link
nosplit
Computer security
57.85. Deception technology
link
nosplit
Computer security
57.86. Defense strategy (computing)
link
nosplit
Computer security
57.87. Defensive computing
link
nosplit
Computer security
57.88. Democratic Congressional Campaign Committee cyber attacks
link
nosplit
Computer security
57.89. Democratic National Committee cyber attacks
link
nosplit
Computer security
57.90. Digital self-defense
link
nosplit
Computer security
57.91. Digital supply chain security
link
nosplit
Computer security
57.92. Dolev–Yao model
link
nosplit
Computer security
57.93. Domain fronting
link
nosplit
Computer security
57.94. ERP security
link
nosplit
Computer security
57.95. EasyJet data breach
link
nosplit
Computer security
57.96. Electric grid security in the United States
link
nosplit
Computer security
57.97. Enterprise information security architecture
link
nosplit
Computer security
57.98. Fabric of Security
link
nosplit
Computer security
57.99. Fail-stop
link
nosplit
Computer security
57.100. Federal Desktop Core Configuration
link
nosplit
Computer security
57.101. Footprinting
link
nosplit
Computer security
57.102. Four Horsemen of the Infocalypse
link
nosplit
Computer security
57.103. Grayshift
link
nosplit
Computer security
57.104. HEAT LANrev
link
nosplit
Computer security
57.105. HTTP tunnel
link
nosplit
Computer security
57.106. Hacker Bible
link
nosplit
Computer security
57.107. Hardware security
link
nosplit
Computer security
57.108. High Assurance Guard
link
nosplit
Computer security
57.109. Highly Evasive Adaptive Threat
link
nosplit
Computer security
57.110. Homeland Open Security Technology
link
nosplit
Computer security
57.111. Host Based Security System
link
nosplit
Computer security
57.112. ITIL security management
link
nosplit
Computer security
57.113. IT baseline protection
link
nosplit
Computer security
57.114. Indirect Branch Tracking
link
nosplit
Computer security
57.115. Information Exchange Gateway
link
nosplit
Computer security
57.116. Information Security Automation Program
link
nosplit
Computer security
57.117. Information security operations center
link
nosplit
Computer security
57.118. Insider threat
link
nosplit
Computer security
57.119. Intel Management Engine
link
nosplit
Computer security
57.120. Internet Security Awareness Training
link
nosplit
Computer security
57.121. Intrusion tolerance
link
nosplit
Computer security
57.122. Israeli cybersecurity industry
link
nosplit
Computer security
57.123. Kill pill
link
nosplit
Computer security
57.124. Language-based security
link
nosplit
Computer security
57.125. Linked timestamping
link
nosplit
Computer security
57.126. List of security assessment tools
link
nosplit
Computer security
57.127. List of security hacking incidents
link
nosplit
Computer security
57.128. Macro and security
link
nosplit
Computer security
57.129. Microsoft Support Diagnostic Tool
link
nosplit
Computer security
57.130. MinID
link
nosplit
Computer security
57.131. Model-driven security
link
nosplit
Computer security
57.132. Multi-factor authentication fatigue attack
link
nosplit
Computer security
57.133. National Collegiate Cyber Defense Competition
link
nosplit
Computer security
57.134. National Cyber Security Awareness Month
link
nosplit
Computer security
57.135. National Cyber Security Policy 2013
link
nosplit
Computer security
57.136. Network behavior anomaly detection
link
nosplit
Computer security
57.137. Network eavesdropping
link
nosplit
Computer security
57.138. Nobody (username)
link
nosplit
Computer security
57.139. Opal Storage Specification
link
nosplit
Computer security
57.140. Open-source software security
link
nosplit
Computer security
57.141. Open Threat Exchange
link
nosplit
Computer security
57.142. Open security
link
nosplit
Computer security
57.143. Operations security
link
nosplit
Computer security
57.144. Outline of computer security
link
nosplit
Computer security
57.145. PRODIGAL
link
nosplit
Computer security
57.146. Parkerian Hexad
link
nosplit
Computer security
57.147. Physical access
link
nosplit
Computer security
57.148. Physical information security
link
nosplit
Computer security
57.149. Principal (computer security)
link
nosplit
Computer security
57.150. Public computer
link
nosplit
Computer security
57.151. Pwnie Awards
link
nosplit
Computer security
57.152. RFPolicy
link
nosplit
Computer security
57.153. Refraction networking
link
nosplit
Computer security
57.154. Relying party
link
nosplit
Computer security
57.155. Risk factor (computing)
link
nosplit
Computer security
57.156. Runtime application self-protection
link
nosplit
Computer security
57.157. SCADA Strangelove
link
nosplit
Computer security
57.158. SMBGhost
link
nosplit
Computer security
57.159. STRIDE (security)
link
nosplit
Computer security
57.160. SafetyNet API
link
nosplit
Computer security
57.161. Sahara Net
link
nosplit
Computer security
57.162. Seccomp
link
nosplit
Computer security
57.163. Secure coding
link
nosplit
Computer security
57.164. Secure element
link
nosplit
Computer security
57.165. Secure environment
link
nosplit
Computer security
57.166. Secure state
link
nosplit
Computer security
57.167. Secure transmission
link
nosplit
Computer security
57.168. Security.txt
link
nosplit
Computer security
57.169. Security Vision
link
nosplit
Computer security
57.170. Security and Privacy in Computer Systems
link
nosplit
Computer security
57.171. Security awareness
link
nosplit
Computer security
57.172. Security breach notification laws
link
nosplit
Computer security
57.173. Security bug
link
nosplit
Computer security
57.174. Security hacker
link
nosplit
Computer security
57.175. Security information management
link
nosplit
Computer security
57.176. Security log
link
nosplit
Computer security
57.177. Security of the Java software platform
link
nosplit
Computer security
57.178. Security switch
link
nosplit
Computer security
57.179. Security testing
link
nosplit
Computer security
57.180. Security type system
link
nosplit
Computer security
57.181. Separation of protection and security
link
nosplit
Computer security
57.182. Service account
link
nosplit
Computer security
57.183. Shadow stack
link
nosplit
Computer security
57.184. Shell Control Box
link
nosplit
Computer security
57.185. Sherwood Applied Business Security Architecture
link
nosplit
Computer security
57.186. Site Security Handbook
link
nosplit
Computer security
57.187. Software-defined perimeter
link
nosplit
Computer security
57.188. Software Guard Extensions
link
nosplit
Computer security
57.189. Spanish Cybersecurity Research Conference
link
nosplit
Computer security
57.190. Spanish Network of Excellence on Cybersecurity Research
link
nosplit
Computer security
57.191. Stegomalware
link
nosplit
Computer security
57.192. Supervisor Mode Access Prevention
link
nosplit
Computer security
57.193. System Service Descriptor Table
link
nosplit
Computer security
57.194. System integrity
link
nosplit
Computer security
57.195. Thermal attack
link
nosplit
Computer security
57.196. Thunderspy
link
nosplit
Computer security
57.197. Trademark (computer security)
link
nosplit
Computer security
57.198. Trust boundary
link
nosplit
Computer security
57.199. Trust on first use
link
nosplit
Computer security
57.200. Trusted client
link
nosplit
Computer security
57.201. Trustworthy computing
link
nosplit
Computer security
57.202. Tunneling protocol
link
nosplit
Computer security
57.203. Typed assembly language
link
nosplit
Computer security
57.204. US Cyber Challenge
link
nosplit
Computer security
57.205. Unspent transaction output
link
nosplit
Computer security
57.206. Vanish (computer science)
link
nosplit
Computer security
57.207. Vastaamo data breach
link
nosplit
Computer security
57.208. Vulnerabilities Equities Process
link
nosplit
Computer security
57.209. Vulnerability Discovery Model
link
nosplit
Computer security
57.210. Vulnerability assessment (computing)
link
nosplit
Computer security
57.211. WS-SecurityPolicy
link
nosplit
Computer security
57.212. Ware report
link
nosplit
Computer security
57.213. Wargame (hacking)
link
nosplit
Computer security
57.214. Zardoz (computer security)
link
nosplit
Computer security
57.215. Zero-day (computing)
link
nosplit
Computer security
57.216. Zero-knowledge service
link
nosplit
Computer security
58. Conjugate coding
link
nosplit
Cryptography
59. Convergent encryption
link
nosplit
Cryptography
60. Correlation immunity
link
nosplit
Cryptography
61. Cover-coding
link
nosplit
Cryptography
62. Cover (telecommunications)
link
nosplit
Cryptography
63. Critical security parameter
link
nosplit
Cryptography
64. CrySyS Lab
link
nosplit
Cryptography
65. CryptoParty
link
nosplit
Cryptography
66. Crypto naming controversy
link
nosplit
Cryptography
67. Cryptochannel
link
nosplit
Cryptography
68. Cryptographic High Value Product
link
nosplit
Cryptography
69. Cryptographic Module Testing Laboratory
link
nosplit
Cryptography
70. Cryptographic Service Provider
link
nosplit
Cryptography
71. Cryptographic module
link
nosplit
Cryptography
72. Cryptographic nonce
link
nosplit
Cryptography
73. Cryptosystem
link
nosplit
Cryptography
74. Cryptovirology
link
nosplit
Cryptography
75. Cypherpunks (book)
link
nosplit
Cryptography
76. Data at rest
link
nosplit
Cryptography
77. Data in use
link
nosplit
Cryptography
78. Database encryption
link
nosplit
Cryptography
79. Decipherment
link
nosplit
Cryptography
80. Deniable encryption
link
nosplit
Cryptography
81. Designated verifier signature
link
nosplit
Cryptography
82. Dining cryptographers problem
link
nosplit
Cryptography
83. Diplomatic bag
link
nosplit
Cryptography
84. Direct Anonymous Attestation
link
nosplit
Cryptography
85. Discrete logarithm
link
nosplit
Cryptography
86. Discriminant Book
link
nosplit
Cryptography
87. ESign (India)
link
nosplit
Cryptography
88. Election security
link
nosplit
Cryptography
89. Electronic signature
link
nosplit
Cryptography
90. Encrypted function
link
nosplit
Cryptography
91. Encryption
link
nosplit
Cryptography
92. End-to-end encryption
link
nosplit
Cryptography
93. Enhanced privacy ID
link
nosplit
Cryptography
94. Entropic security
link
nosplit
Cryptography
95. Feistel cipher
link
nosplit
Cryptography
96. Floradora
link
nosplit
Cryptography
97. Forking lemma
link
nosplit
Cryptography
98. Format-preserving encryption
link
nosplit
Cryptography
99. Format-transforming encryption
link
nosplit
Cryptography
100. Forward anonymity
link
nosplit
Cryptography
101. Group key
link
nosplit
Cryptography
102. HKDF
link
nosplit
Cryptography
103. HTTP Strict Transport Security
link
nosplit
Cryptography
104. Hardware-based encryption
link
nosplit
Cryptography
105. Harvest now, decrypt later
link
nosplit
Cryptography
106. HashClash
link
nosplit
Cryptography
107. Hashgraph
link
nosplit
Cryptography
108. Honey encryption
link
nosplit
Cryptography
109. Human rights and encryption
link
nosplit
Cryptography
110. Hybrid argument (Cryptography)
link
nosplit
Cryptography
111. Hybrid cryptosystem
link
nosplit
Cryptography
112. ISO/IEC 19790
link
nosplit
Cryptography
113. Information leakage
link
nosplit
Cryptography
114. Information security
link
nosplit
Cryptography
115. Initialization vector
link
nosplit
Cryptography
116. KLJN Secure Key Exchange
link
nosplit
Cryptography
117. Kerckhoffs's principle
link
nosplit
Cryptography
118. Key-agreement protocol
link
nosplit
Cryptography
119. Keyring (cryptography)
link
nosplit
Cryptography
120. Knapsack cryptosystems
link
nosplit
Cryptography
121. Kruskal count
link
nosplit
Cryptography
122. Kurzsignale
link
nosplit
Cryptography
123. Letter frequency
link
nosplit
Cryptography
124. Link encryption
link
nosplit
Cryptography
125. MDS matrix
link
nosplit
Cryptography
126. MIME Object Security Services
link
nosplit
Cryptography
127. Malleability (cryptography)
link
nosplit
Cryptography
128. Master/Session
link
nosplit
Cryptography
129. Memory-hard function
link
nosplit
Cryptography
130. Messaging Layer Security
link
nosplit
Cryptography
131. Microsoft Security Development Lifecycle
link
nosplit
Cryptography
132. Multiple encryption
link
nosplit
Cryptography
133. Musical cryptogram
link
nosplit
Cryptography
134. NIPRNet
link
nosplit
Cryptography
135. Offensive Security
link
nosplit
Cryptography
136. One-time pad
link
nosplit
Cryptography
137. Online credentials for learning
link
nosplit
Cryptography
138. PGP word list
link
nosplit
Cryptography
139. PKIoverheid
link
nosplit
Cryptography
140. POODLE
link
nosplit
Cryptography
141. PRESENT
link
nosplit
Cryptography
142. PURB (cryptography)
link
nosplit
Cryptography
143. Padding (cryptography)
link
nosplit
Cryptography
144. Passphrase
link
nosplit
Cryptography
145. Password-authenticated key agreement
link
nosplit
Cryptography
146. Password-based cryptography
link
nosplit
Cryptography
147. Password strength
link
nosplit
Cryptography
148. Pepper (cryptography)
link
nosplit
Cryptography
149. Philco computers
link
nosplit
Cryptography
150. PhotoDNA
link
nosplit
Cryptography
151. Pizzino
link
nosplit
Cryptography
152. Plaintext
link
nosplit
Cryptography
153. Point-to-point encryption
link
nosplit
Cryptography
154. Polygraphic substitution
link
nosplit
Cryptography
155. Prince (cipher)
link
nosplit
Cryptography
156. PrivateCore
link
nosplit
Cryptography
157. Private set intersection
link
nosplit
Cryptography
158. Privilege Management Infrastructure
link
nosplit
Cryptography
159. Probabilistic signature scheme
link
nosplit
Cryptography
160. Proof of identity (blockchain consensus)
link
nosplit
Cryptography
161. Proof of knowledge
link
nosplit
Cryptography
162. Proof of personhood
link
nosplit
Cryptography
163. Proof of space
link
nosplit
Cryptography
164. Proof of stake
link
nosplit
Cryptography
165. Proof of work
link
nosplit
Cryptography
166. Protocol composition logic
link
nosplit
Cryptography
167. Quark (hash function)
link
nosplit
Cryptography
168. RCCA security
link
nosplit
Cryptography
169. RSA Award for Excellence in Mathematics
link
nosplit
Cryptography
170. Randomness
link
nosplit
Cryptography
19
170.1. Coincidence
link
nosplit
Randomness
170.2. Luck
link
nosplit
Randomness
170.3. Statistical randomness
link
nosplit
Randomness
170.4. Apophenia
link
nosplit
Randomness
170.5. Casualism (philosophy)
link
nosplit
Randomness
170.6. Complex random variable
link
nosplit
Randomness
170.7. Complex random vector
link
nosplit
Randomness
170.8. Deterministic noise
link
nosplit
Randomness
170.9. Differential effects
link
nosplit
Randomness
170.10. History of randomness
link
nosplit
Randomness
170.11. Incompatibilism
link
nosplit
Randomness
170.12. Indeterminacy (philosophy)
link
nosplit
Randomness
170.13. Indeterminism
link
nosplit
Randomness
170.14. International Random Film Festival
link
nosplit
Randomness
170.15. Odds
link
nosplit
Randomness
170.16. Philosophical interpretation of classical physics
link
nosplit
Randomness
170.17. Random stimulus
link
nosplit
Randomness
170.18. Sunspots (economics)
link
nosplit
Randomness
170.19. Willy-nilly (idiom)
link
nosplit
Randomness
171. Red/black concept
link
nosplit
Cryptography
172. S/MIME
link
nosplit
Cryptography
173. SFINKS
link
nosplit
Cryptography
174. SIGINT Activity Designator
link
nosplit
Cryptography
175. SIPRNet
link
nosplit
Cryptography
176. SPKAC
link
nosplit
Cryptography
177. Salt (cryptography)
link
nosplit
Cryptography
178. Secret sharing
link
nosplit
Cryptography
2
178.1. Proactive secret sharing
link
nosplit
Secret sharing
178.2. Shamir's secret sharing
link
nosplit
Secret sharing
179. Secure Hash Algorithms
link
nosplit
Cryptography
180. Secure channel
link
nosplit
Cryptography
181. Secure two-party computation
link
nosplit
Cryptography
182. Secure voice
link
nosplit
Cryptography
183. Security association
link
nosplit
Cryptography
184. Security level
link
nosplit
Cryptography
185. Security parameter
link
nosplit
Cryptography
186. Security protocol notation
link
nosplit
Cryptography
187. Security through obscurity
link
nosplit
Cryptography
188. Server-Gated Cryptography
link
nosplit
Cryptography
189. Server-based signatures
link
nosplit
Cryptography
190. Short Weather Cipher
link
nosplit
Cryptography
191. Signals intelligence
link
nosplit
Cryptography
89
191.1. Electronic intelligence ships
link
nosplit
Signals intelligence
191.2. Longview-class missile range instrumentation ships
link
nosplit
Signals intelligence
191.3. Signals intelligence agencies
link
nosplit
Signals intelligence
191.4. Signals intelligence installations
link
nosplit
Signals intelligence
191.5. Signals intelligence satellites
link
nosplit
Signals intelligence
191.6. Signals intelligence units and formations
link
nosplit
Signals intelligence
191.7. Watertown-class missile range instrumentation ships
link
nosplit
Signals intelligence
191.8. 2011 Slovenian YouTube incident
link
nosplit
Signals intelligence
191.9. ASTAC
link
nosplit
Signals intelligence
191.10. Balzam-class intelligence ship
link
nosplit
Signals intelligence
191.11. Beechcraft C-12 Huron
link
nosplit
Signals intelligence
191.12. Beechcraft RC-12 Guardrail
link
nosplit
Signals intelligence
191.13. Boeing RC-135
link
nosplit
Signals intelligence
191.14. CFS Alert
link
nosplit
Signals intelligence
191.15. CFS Frobisher Bay
link
nosplit
Signals intelligence
191.16. CFS Leitrim
link
nosplit
Signals intelligence
191.17. CFS Masset
link
nosplit
Signals intelligence
191.18. Canyon (satellite)
link
nosplit
Signals intelligence
191.19. Center S
link
nosplit
Signals intelligence
191.20. Chatter (signals intelligence)
link
nosplit
Signals intelligence
191.21. Clémentine (satellite)
link
nosplit
Signals intelligence
191.22. Data Warehouse System Electronic Surveillance Data Management System
link
nosplit
Signals intelligence
191.23. Defense of Democracies
link
nosplit
Signals intelligence
191.24. ECHELON
link
nosplit
Signals intelligence
191.25. English Electric Canberra
link
nosplit
Signals intelligence
191.26. Foreign Intelligence Surveillance Act
link
nosplit
Signals intelligence
191.27. Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008
link
nosplit
Signals intelligence
191.28. Frenchelon
link
nosplit
Signals intelligence
191.29. General Atomics MQ-1 Predator
link
nosplit
Signals intelligence
191.30. General Atomics MQ-20 Avenger
link
nosplit
Signals intelligence
191.31. General Atomics MQ-9 Reaper
link
nosplit
Signals intelligence
191.32. Gottfried Schapper
link
nosplit
Signals intelligence
191.33. Hainan Island incident
link
nosplit
Signals intelligence
191.34. Hawker Siddeley Nimrod
link
nosplit
Signals intelligence
191.35. Hawker Siddeley Nimrod R1
link
nosplit
Signals intelligence
191.36. Heer and Luftwaffe Signals School
link
nosplit
Signals intelligence
191.37. Hohenstadt Transmission Tower
link
nosplit
Signals intelligence
191.38. INS Anvesh (A41)
link
nosplit
Signals intelligence
191.39. Khibiny (electronic countermeasures system)
link
nosplit
Signals intelligence
191.40. List of government mass surveillance projects
link
nosplit
Signals intelligence
191.41. Listening station
link
nosplit
Signals intelligence
191.42. Lockheed A-12
link
nosplit
Signals intelligence
191.43. Lockheed CP-140 Aurora
link
nosplit
Signals intelligence
191.44. Lockheed EP-3
link
nosplit
Signals intelligence
191.45. Lockheed P-3 Orion
link
nosplit
Signals intelligence
191.46. Lockheed SR-71 Blackbird
link
nosplit
Signals intelligence
191.47. Lockheed U-2
link
nosplit
Signals intelligence
191.48. National Precursor Log Exchange
link
nosplit
Signals intelligence
191.49. Non-communications signals
link
nosplit
Signals intelligence
191.50. Northrop Grumman RQ-180
link
nosplit
Signals intelligence
191.51. Northrop Grumman RQ-4 Global Hawk
link
nosplit
Signals intelligence
191.52. Onyx (interception system)
link
nosplit
Signals intelligence
191.53. Operation Ivy Bells
link
nosplit
Signals intelligence
191.54. Operation Jungle
link
nosplit
Signals intelligence
191.55. Operation RAFTER
link
nosplit
Signals intelligence
191.56. Primor'ye-class surveillance ship
link
nosplit
Signals intelligence
191.57. Project AQUILINE
link
nosplit
Signals intelligence
191.58. Project RAINBOW
link
nosplit
Signals intelligence
191.59. SEXINT
link
nosplit
Signals intelligence
191.60. SOSUS
link
nosplit
Signals intelligence
191.61. Shaanxi Y-9JZ
link
nosplit
Signals intelligence
191.62. Short-range agent communications
link
nosplit
Signals intelligence
191.63. Signals intelligence in modern history
link
nosplit
Signals intelligence
191.64. Special Collection Service
link
nosplit
Signals intelligence
191.65. Spy ship
link
nosplit
Signals intelligence
191.66. Stateroom (surveillance program)
link
nosplit
Signals intelligence
191.67. Surveillance aircraft
link
nosplit
Signals intelligence
191.68. Technical research ship
link
nosplit
Signals intelligence
191.69. Telemetry intelligence
link
nosplit
Signals intelligence
191.70. Tethered Aerostat Radar System
link
nosplit
Signals intelligence
191.71. Titan traffic database
link
nosplit
Signals intelligence
191.72. Tracking ship
link
nosplit
Signals intelligence
191.73. Triggerfish (surveillance)
link
nosplit
Signals intelligence
191.74. USNS Coastal Crusader
link
nosplit
Signals intelligence
191.75. USNS Coastal Sentry
link
nosplit
Signals intelligence
191.76. USNS Range Recoverer
link
nosplit
Signals intelligence
191.77. USNS Sampan Hitch
link
nosplit
Signals intelligence
191.78. USNS Sgt. Joseph E. Muller
link
nosplit
Signals intelligence
191.79. USNS Sword Knot
link
nosplit
Signals intelligence
191.80. USNS Timber Hitch
link
nosplit
Signals intelligence
191.81. USS Halibut (SSGN-587)
link
nosplit
Signals intelligence
191.82. USS Liberty (AGTR-5)
link
nosplit
Signals intelligence
191.83. USS Sherburne
link
nosplit
Signals intelligence
191.84. USS Swordfish (SSN-579)
link
nosplit
Signals intelligence
191.85. US signals intelligence in the Cold War
link
nosplit
Signals intelligence
191.86. United States Army Signal Corps
link
nosplit
Signals intelligence
191.87. Vishnya-class intelligence ship
link
nosplit
Signals intelligence
191.88. Warrenton Training Center
link
nosplit
Signals intelligence
191.89. Yury Ivanov-class intelligence ship
link
nosplit
Signals intelligence
192. Signatures with efficient protocols
link
nosplit
Cryptography
193. Smart-ID
link
nosplit
Cryptography
194. Snake oil (cryptography)
link
nosplit
Cryptography
195. Software token
link
nosplit
Cryptography
196. Strong cryptography
link
nosplit
Cryptography
197. Strong secrecy
link
nosplit
Cryptography
198. Subliminal channel
link
nosplit
Cryptography
199. Superincreasing sequence
link
nosplit
Cryptography
200. Symmetric Boolean function
link
nosplit
Cryptography
201. Tableau de Concordance
link
nosplit
Cryptography
202. Tokenization (data security)
link
nosplit
Cryptography
203. Trace zero cryptography
link
nosplit
Cryptography
204. Transmission security
link
nosplit
Cryptography
205. Tropical cryptography
link
nosplit
Cryptography
206. Trusted Computing
link
nosplit
Cryptography
207. Undeniable signature
link
nosplit
Cryptography
208. Unknown key-share attack
link
nosplit
Cryptography
209. Verifiable secret sharing
link
nosplit
Cryptography
210. Visual cryptography
link
nosplit
Cryptography
211. Voice inversion
link
nosplit
Cryptography
212. WYSIWYS
link
nosplit
Cryptography
213. Zcash
link
nosplit
Cryptography
Ancestors
Applied mathematics
Fields of mathematics
Mathematics
OurBigBook Wikipedia Bot