请输入您要查询的百科知识:

 

词条 Index of cryptography articles
释义

  1. 0–9

  2. A

  3. B

  4. C

  5. D

  6. E

  7. F

  8. G

  9. H

  10. I

  11. J

  12. K

  13. L

  14. M

  15. N

  16. O

  17. P

  18. Q

  19. R

  20. S

  21. T

  22. U

  23. V

  24. W

  25. X

  26. Y

  27. Z

  28. See also

Articles related to cryptography include:

{{Compact ToC|side=yes|num=yes|seealso=yes|nobreak=yes}}

0–9

3-D Secure

3-subset meet-in-the-middle attack

3-Way

40-bit encryption

56-bit encryption

5-UCO

A

A5/1

A5/2

ABA digital signature guidelines

ABC (stream cipher)

Abraham Sinkov

Acoustic cryptanalysis

Adaptive chosen-ciphertext attack

Adaptive chosen plaintext and chosen ciphertext attack

Advantage (cryptography)

ADFGVX cipher

Adi Shamir

Advanced Access Content System

Advanced Encryption Standard

Advanced Encryption Standard process

Adversary

AEAD block cipher modes of operation

Affine cipher

Agnes Meyer Driscoll

AKA (security)

Akelarre (cipher)

Alan Turing

Alastair Denniston

Al Bhed language

Alex Biryukov

Alfred Menezes

Algebraic Eraser

Algorithmically random sequence

Alice and Bob

All-or-nothing transform

Alphabetum Kaldeorum

Alternating step generator

American Cryptogram Association

AN/CYZ-10

Anonymous publication

Anonymous remailer

Antoni Palluth

Anubis (cipher)

Argon2

ARIA (cipher)

Arlington Hall

Arne Beurling

Arnold Cipher

Array controller based encryption

Arthur Scherbius

Arvid Gerhard Damm

Asiacrypt

Atbash

Attack model

Auguste Kerckhoffs

Authenticated encryption

Authentication

Authorization certificate

Autokey cipher

Avalanche effect

B

B-Dienst

Babington Plot

Baby-step giant-step

Bacon's cipher

Banburismus

Bart Preneel

BaseKing

BassOmatic

BATON

BB84

Beale ciphers

BEAR and LION ciphers

Beaufort cipher

Beaumanor Hall

Bent function

Berlekamp–Massey algorithm

Bernstein v. United States

BestCrypt

Biclique attack

BID/60

BID 770

Bifid cipher

Bill Weisband

Binary Goppa code

Biometric word list

Birthday attack

Bit-flipping attack

BitTorrent protocol encryption

Biuro Szyfrów

Black Chamber

Blaise de Vigenère

Bletchley Park

Blind credential

Blinding (cryptography)

Blind signature

Block cipher

Block cipher mode of operation

Block size (cryptography)

Blowfish (cipher)

Blum Blum Shub

Blum–Goldwasser cryptosystem

Bomba (cryptography)

Bombe

Book cipher

Books on cryptography

Boomerang attack

Boris Hagelin

Bouncy Castle (cryptography)

Broadcast encryption

Bruce Schneier

Brute-force attack

Cracking the Data Encryption Standard

Burrows–Abadi–Needham logic

Burt Kaliski

C

C2Net

C-36 (cipher machine)

C-52 (cipher machine)

CAcert.org

Caesar cipher

Camellia (cipher)

CAPICOM

Capstone (cryptography)

Cardan grille

Card catalog (cryptology)

Carlisle Adams

CAST-128

CAST-256

Cayley–Purser algorithm

CBC-MAC

CCM mode

CCMP

CD-57

CDMF

Cellular Message Encryption Algorithm

Centiban

Central Security Service

Centre for Applied Cryptographic Research

Central Bureau

Certicom

Certificate authority

Certificate-based encryption

Certificateless cryptography

Certificate revocation list

Certificate signing request

Certification path validation algorithm

Chaffing and winnowing

Challenge-Handshake Authentication Protocol

Challenge–response authentication

Chosen-ciphertext attack

Chosen-plaintext attack

CIKS-1

Cipher disk

Cipher runes

Cipher security summary

CipherSaber

Ciphertext expansion

Ciphertext indistinguishability

Ciphertext-only attack

Ciphertext stealing

CIPHERUNICORN-A

CIPHERUNICORN-E

Classical cipher

Claude Shannon

Claw-free permutation

Cleartext

CLEFIA

Clifford Cocks

Clipper chip

Clock (cryptography)

Clock drift

CMVP

COCONUT98

Codebook

Code (cryptography)

Code talker

Codress message

Cold boot attack

Collision attack

Collision resistance

Colossus computer

Combined Cipher Machine

Commitment scheme

Common Scrambling Algorithm

Communications security

Communications Security Establishment

Communication Theory of Secrecy Systems

Comparison of disk encryption software

Comparison of SSH clients

Completeness (cryptography)

Complexity trap

Computational Diffie–Hellman assumption

Computational hardness assumption

Computer insecurity

Computer and network surveillance

COMSEC equipment

Conch (SSH)

Concrete security

Conel Hugh O'Donel Alexander

Confidentiality

Confusion and diffusion

Content-scrambling system

Controlled Cryptographic Item

Corkscrew (program)

Correlation immunity

COSIC

Covert channel

Cover (telecommunications)

Crab (cipher)

Cramer–Shoup cryptosystem

CRAM-MD5

CRHF

Crib (cryptanalysis)

CrossCrypt

Crowds

Crypt (C)

Cryptanalysis

Cryptanalysis of the Enigma

Cryptanalysis of the Lorenz cipher

Cryptanalytic computer

Cryptex

Cryptico

Crypto AG

Crypto-anarchism

Crypto API (Linux)

Microsoft CryptoAPI

CryptoBuddy

Cryptochannel

CRYPTO (conference)

Cryptogram

Cryptographically Generated Address

Cryptographically secure pseudorandom number generator

Cryptographically strong

Cryptographic Application Programming Interface

Cryptographic hash function

Cryptographic key types

Cryptographic Message Syntax

Cryptographic primitive

Cryptographic protocol

Cryptographic Service Provider

Cryptographie indéchiffrable

Cryptography

Cryptography in Japan

Cryptography newsgroups

Cryptography standards

How the Code Rebels Beat the Government—Saving Privacy in the Digital Age

Cryptologia

Cryptology ePrint Archive

Cryptology Research Society of India

Cryptomathic

Cryptome

Cryptomeria cipher

Cryptonomicon

CrypTool

Crypto phone

Crypto-society

Cryptosystem

Cryptovirology

CRYPTREC

CS-Cipher

Curve25519

Custom hardware attack

Cycles per byte

Cyclometer

Cypherpunk

Cyrillic Projector

D

D'Agapeyeff cipher

Daniel J. Bernstein

Data Authentication Algorithm

Data Encryption Standard

Datagram Transport Layer Security

David Chaum

David Kahn

David Naccache

David Wagner

David Wheeler (computer scientist)

Davies attack

Davies–Meyer hash

DEAL

Decipherment

Decisional Diffie–Hellman assumption

Decorrelation theory

Decrypt

DeCSS

Defence Signals Directorate

Degree of anonymity

Delegated Path Discovery

Delegated Path Validation

Deniable encryption

Derek Taunt

Derived unique key per transaction

DES Challenges

DES supplementary material

DES-X

Deterministic encryption

DFC (cipher)

Dictionary attack

Differential cryptanalysis

Differential-linear attack

Differential power analysis

Diffie–Hellman key exchange

Diffie–Hellman problem

DigiCipher 2

Digital Fortress

Digital rights management

Digital signature

Digital Signature Algorithm

Digital signature forgery

Digital timestamping

Digital watermarking

Dilly Knox

Dining cryptographers problem

Diplomatic bag

Direct Anonymous Attestation

Discrete logarithm

Disk encryption

Disk encryption hardware

Disk encryption software

Distance-bounding protocol

Distinguishing attack

Distributed.net

DMA attack

dm-crypt

Dmitry Sklyarov

DomainKeys

Don Coppersmith

Dorabella Cipher

Double Ratchet Algorithm

Doug Stinson

Dragon (cipher)

DRYAD

Dual_EC_DRBG

E

E0 (cipher)

E2 (cipher)

E4M

EAP-AKA

EAP-SIM

EAX mode

ECC patents

ECHELON

ECRYPT

Edouard Fleissner von Wostrowitz

Edward Hebern

Edward Scheidt

Edward Travis

EFF DES cracker

Efficient Probabilistic Public-Key Encryption Scheme

EKMS

Electronic Communications Act 2000

Electronic money

Electronic signature

Electronic voting

ElGamal encryption

ElGamal signature scheme

Eli Biham

Elizebeth Friedman

Elliptic-curve cryptography

Elliptic-curve Diffie–Hellman

Elliptic Curve DSA

Elliptic curve only hash

Elonka Dunin

Encrypted function

Encrypted key exchange

Encrypting File System

Encryption

Encryption software

Enigmail

Enigma machine

Enigma rotor details

Entrust

Ernst Fetterlein

eSTREAM

Étienne Bazeries

Eurocrypt

EuroCrypt

Export of cryptography

Extensible Authentication Protocol

F

Fast Software Encryption

Fast syndrome-based hash

FEA-M

FEAL

Feige–Fiat–Shamir identification scheme

Feistel cipher

Félix Delastelle

Fialka

Filesystem-level encryption

FileVault

Fill device

Financial cryptography

FIPS 140

FIPS 140-2

Firefly (key exchange protocol)

FISH (cipher)

Fish (cryptography)

Floradora

Fluhrer, Mantin and Shamir attack

Format-preserving encryption

Fortezza

Fort George G. Meade

Fortuna (PRNG)

Four-square cipher

Franciszek Pokorny

Frank A. Stevenson

Frank Rowlett

Freenet

FreeOTFE

FreeS/WAN

Frequency analysis

Friedrich Kasiski

Fritz-chip

FROG

FROSTBURG

FTP over SSH

Full disk encryption

Full Domain Hash

F. W. Winterbotham

G

Galois/Counter Mode

Gardening (cryptanalysis)

GCHQ Bude

GCHQ CSO Morwenstow

GDES

Generic Security Services Application Program Interface

George Blakley

George Scovell

GGH encryption scheme

GGH signature scheme

Gilbert Vernam

GMR (cryptography)

GNU Privacy Guard

GnuTLS

Goldwasser–Micali cryptosystem

Gordon Welchman

GOST (block cipher)

GOST (hash function)

Government Communications Headquarters

Government Communications Security Bureau

Grain (cipher)

Grand Cru (cipher)

Great Cipher

Grill (cryptology)

Grille (cryptography)

Group-based cryptography

Group signature

Grover's algorithm

Gustave Bertrand

Gwido Langer

H

H.235

HAIFA construction

HAIPE

Hans Dobbertin

Hans-Thilo Schmidt

Hard-core predicate

Hardware random number generator

Hardware security module

Harold Keen

Harry Hinsley

Harvest (computer)

HAS-160

Hash-based cryptography

Hashcash

Hash chain

Hash function security summary

Hash list

Hasty Pudding cipher

HAVAL

HC-256

HC-9

Heath Robinson (codebreaking machine)

Hebern rotor machine

Henri Braquenié

Henryk Zygalski

Herbert Yardley

Hidden Field Equations

Hideki Imai

Hierocrypt

High-bandwidth Digital Content Protection

Higher-order differential cryptanalysis

Hill cipher

History of cryptography

HMAC

HMAC-based One-time Password algorithm (HOTP) •

Horst Feistel

Howard Heys

Https

Hugo Hadwiger

Hugo Koch

Hushmail

Hut 6

Hut 8

HX-63

Hybrid cryptosystem

Hyperelliptic curve cryptography

Hyper-encryption

I

Ian Goldberg

IBM 4758

ICE (cipher)

ID-based cryptography

IDEA NXT

Identification friend or foe

IEEE 802.11i

IEEE P1363

I. J. Good

Illegal prime

Impossible differential cryptanalysis

Index of coincidence

Indifferent chosen-ciphertext attack

Indistinguishability obfuscation

Indocrypt

Information leakage

Information Security Group

Information-theoretic security

Initialization vector

Integer factorization

Integral cryptanalysis

Integrated Encryption Scheme

Integrated Windows Authentication

Interlock protocol

Intermediate certificate authorities

International Association for Cryptologic Research

International Data Encryption Algorithm

Internet Key Exchange

Internet Security Association and Key Management Protocol

Interpolation attack

Invisible ink

IPsec

Iraqi block cipher

ISAAC (cipher)

ISO 19092-2

ISO/IEC 9797

Ivan Damgård

J

Jacques Stern

JADE (cypher machine)

James Gillogly

James H. Ellis

James Massey

Jan Graliński

Jan Kowalewski

Japanese naval codes

Java Cryptography Architecture

Jefferson disk

Jennifer Seberry

Jerzy Różycki

Joan Daemen

Johannes Trithemius

John Herivel

John Kelsey (cryptanalyst)

John R. F. Jeffreys

John Tiltman

Jon Lech Johansen

Josef Pieprzyk

Joseph Desch

Joseph Finnegan (cryptographer)

Joseph Mauborgne

Joseph Rochefort

Journal of Cryptology

Junger v. Daley

K

Kaisa Nyberg

Kalyna (cipher)

Kasiski examination

KASUMI

KCDSA

KeePass

Kerberos (protocol)

Kerckhoffs's principle

Kevin McCurley (cryptographer)

Key-agreement protocol

Key authentication

Key clustering

Key (cryptography)

Key derivation function

Key distribution center

Key escrow

Key exchange

Keyfile

Key generation

Key generator

Key management

Key-recovery attack

Key schedule

Key server (cryptographic)

Key signature (cryptography)

Keysigning

Key signing party

Key size

Key space (cryptography)

Keystream

Key stretching

Key whitening

KG-84

KHAZAD

Khufu and Khafre

Kiss (cryptanalysis)

KL-43

KL-51

KL-7

Kleptography

KN-Cipher

Knapsack problem

Known-key distinguishing attack

Known-plaintext attack

KnownSafe

KOI-18

KOV-14

Kryha

Kryptos

KSD-64

Kupyna

Kuznyechik

KW-26

KW-37

KY-3

KY-57

KY-58

KY-68

KYK-13

L

Lacida

Ladder-DES

Lamport signature

Lars Knudsen

Lattice-based cryptography

Laurance Safford

Lawrie Brown

LCS35

Leo Marks

Leonard Adleman

Leon Battista Alberti

Leo Rosen

Leslie Yoxall

LEVIATHAN (cipher)

LEX (cipher)

Libelle (cipher)

Linear cryptanalysis

Linear-feedback shift register

Link encryption

List of ciphertexts

List of cryptographers

List of cryptographic file systems

List of cryptographic key types

List of cryptology conferences

List of telecommunications encryption terms • List of people associated with Bletchley Park •

List of SFTP clients

List of SFTP server software

LOKI

LOKI97

Lorenz cipher

Louis W. Tordella

Lsh

Lucifer (cipher)

Lyra2

M

M6 (cipher)

M8 (cipher)

M-209

M-325

M-94

MacGuffin (cipher)

Madryga

MAGENTA

Magic (cryptography)

Maksymilian Ciężki

Malcolm J. Williamson

Malleability (cryptography)

Man-in-the-middle attack

Marian Rejewski

MARS (cryptography)

Martin Hellman

MaruTukku

Massey–Omura cryptosystem

Matt Blaze

Matt Robshaw

Max Newman

McEliece cryptosystem

mcrypt

MD2 (cryptography)

MD4

MD5

MD5CRK

MDC-2

MDS matrix

Mean shortest distance

Meet-in-the-middle attack

Mental poker

Mercury (cipher machine)

Mercy (cipher)

Meredith Gardner

Merkle signature scheme

Merkle–Damgård construction

Merkle–Hellman knapsack cryptosystem

Merkle's Puzzles

Merkle tree

MESH (cipher)

Message authentication

Message authentication code

Message forgery

MI8

Michael Luby

MICKEY

Microdot

Military Cryptanalysis (book) (William F. Friedman)

Military Cryptanalytics

Mimic function

Mirror writing

MISTY1

Mitsuru Matsui

MMB (cipher)

Mod n cryptanalysis

MQV

MS-CHAP

MUGI

MULTI-S01

MultiSwap

Multivariate cryptography

N

National Communications Centre

National Cryptologic Museum

National Security Agency

National Cipher Challenge

Navajo I

Neal Koblitz

Needham–Schroeder protocol

Negligible function

NEMA (machine)

NESSIE

Network Security Services

Neural cryptography

New Data Seal

NewDES

N-Hash

Nicolas Courtois

Niederreiter cryptosystem

Niels Ferguson

Nigel de Grey

Nihilist cipher

Nikita Borisov

Nimbus (cipher)

NIST hash function competition

Nonlinear-feedback shift register

NOEKEON

Non-malleable codes

Noreen

Nothing up my sleeve number

NSA cryptography

NSA encryption systems

NSA in fiction

NSAKEY

NSA Suite A Cryptography

NSA Suite B Cryptography

NT LAN Manager

NTLMSSP

NTRUEncrypt

NTRUSign

Null cipher

Numbers station

NUSH

NTRU

O

Oblivious transfer

OCB mode

Oded Goldreich

Off-the-Record Messaging

Okamoto–Uchiyama cryptosystem

OMI cryptograph

OMNI (SCIP)

One-key MAC

One-time pad

One-time password

One-way compression function

One-way function

Onion routing

Online Certificate Status Protocol

OP-20-G

OpenPGP card

OpenSSH

OpenSSL

Openswan

OpenVPN

Operation Ruthless

Optimal asymmetric encryption padding

Over the Air Rekeying (OTAR) •

OTFE

Otway–Rees protocol

P

Padding (cryptography)

Padding oracle attack

Paillier cryptosystem

Pairing-based cryptography

Panama (cryptography)

Partitioning cryptanalysis

Passive attack

Passphrase

Password

Password-authenticated key agreement

Password cracking

Password Hashing Competition

Paul Kocher

Paulo Pancatuccio

Paulo S. L. M. Barreto

Paul van Oorschot

PBKDF2

PC Bruno

Pepper (cryptography)

Perfect forward secrecy

Perforated sheets

Permutation cipher

Peter Gutmann (computer scientist)

Peter Junger

Peter Twinn

PGP Corporation

PGPDisk

PGPfone

Phelix

Phil Zimmermann

Photuris (protocol)

Physical security

Physical unclonable function

Pig Latin

Pigpen cipher

Pike (cipher)

Piling-up lemma

Pinwheel (cryptography)

Piotr Smoleński

Pirate decryption

PKC (conference)

PKCS

PKCS 11

PKCS 12

PKIX

Plaintext

Plaintext-aware encryption

Playfair cipher

Plugboard

PMAC (cryptography)

Poem code

Pohlig–Hellman algorithm

Point-to-Point Tunneling Protocol

Pointcheval–Stern signature algorithm

Poly1305

Polyalphabetic cipher

Polybius square

Portex

Post-quantum cryptography

Post-Quantum Cryptography Standardization

Power analysis

Preimage attack

Pre-shared key

Pretty Good Privacy

Printer steganography

Privacy-enhanced Electronic Mail

Private Communications Technology

Private information retrieval

Probabilistic encryption

Product cipher

Proof-of-work system

Protected Extensible Authentication Protocol

Provable security

Provably secure cryptographic hash function

Proxy re-encryption

Pseudo-Hadamard transform

Pseudonymity

Pseudorandom function

Pseudorandom number generator

Pseudorandom permutation

Public key certificate

Public-key cryptography

Public key fingerprint

Public key infrastructure

PURPLE

PuTTY

Py (cipher)

Q

Q (cipher)

Qrpff

QUAD (cipher)

Quadratic sieve

Quantum coin flipping

Quantum cryptography

Quantum digital signature

Quantum fingerprinting

Quantum key distribution

R

Rabbit (cipher)

Rabin cryptosystem

Rabin–Williams encryption

RadioGatún

Rail fence cipher

Rainbow table

Ralph Merkle

Rambutan (cryptography)

Random function

Randomness tests

Random number generator attack

Random oracle

RC2

RC4

RC5

RC6

Rebound attack

Reciprocal cipher

Red/black concept

REDOC

Red Pike (cipher)

Reflector (cipher machine)

Regulation of Investigatory Powers Act 2000

Reihenschieber

Rekeying (cryptography)

Related-key attack

Replay attack

Reservehandverfahren

Residual block termination

Rijndael key schedule

Rijndael S-box

Ring signature

RIPEMD

Rip van Winkle cipher

Robert Morris (cryptographer)

Robot certificate authority

Rockex

Rolf Noskwith

Ron Rivest

Room 40

Root certificate

Ross J. Anderson

Rossignols

ROT13

Rotor machine

RSA RSA|

RSA-100

RSA-1024

RSA-110

RSA-120

RSA-129

RSA-130

RSA-140

RSA-150

RSA-1536

RSA-155

RSA-160

RSA-170

RSA-180

RSA-190

RSA-200

RSA-2048

RSA-210

RSA-220

RSA-230

RSA-232

RSA-240

RSA-250

RSA-260

RSA-270

RSA-280

RSA-290

RSA-300

RSA-309

RSA-310

RSA-320

RSA-330

RSA-340

RSA-350

RSA-360

RSA-370

RSA-380

RSA-390

RSA-400

RSA-410

RSA-420

RSA-430

RSA-440

RSA-450

RSA-460

RSA-470

RSA-480

RSA-490

RSA-500

RSA-576

RSA-617

RSA-640

RSA-704

RSA-768

RSA-896

RSA-PSS

RSA Factoring Challenge

RSA problem

RSA Secret-Key Challenge

RSA Security

Rubber-hose cryptanalysis

Running key cipher

Russian copulation

S

S-1 block cipher

SAFER

Salsa20

Salt (cryptography)

SAM card

Security Support Provider Interface

SAML

SAVILLE

SC2000

Schnorr group

Schnorr signature

Schoof–Elkies–Atkin algorithm

SCIP

Scott Vanstone

Scrambler

Scramdisk

Scream (cipher)

Scrypt

Scytale

Seahorse (software)

SEAL (cipher)

Sean Murphy (cryptographer)

SECG

Secret broadcast

Secret decoder ring

Secrets and Lies (Schneier)

Secret sharing

Sectéra Secure Module

Secure access module

Secure channel

Secure Communication based on Quantum Cryptography

Secure copy

Secure cryptoprocessor

Secure Electronic Transaction

Secure Hash Algorithms

Secure Hypertext Transfer Protocol

Secure key issuing cryptography

Secure multi-party computation

Secure Neighbor Discovery

Secure Real-time Transport Protocol

Secure remote password protocol

Secure Shell

Secure telephone

Secure Terminal Equipment

Secure voice

SecurID

Security association

Security engineering

Security level

Security parameter

Security protocol notation

Security through obscurity

Security token

SEED

Selected Areas in Cryptography

Self-certifying File System

Self-shrinking generator

Self-signed certificate

Semantic security

Serge Vaudenay

Serpent (cipher)

Session key

SHACAL

Shafi Goldwasser

SHA-1

SHA-2

SHA-3

Shared secret

SHARK

Shaun Wylie

Shor's algorithm

Shrinking generator

Shugborough inscription

Side-channel attack

Siemens and Halske T52

SIGABA

SIGCUM

SIGINT

Signal Protocol

Signal Intelligence Service

Signcryption

SIGSALY

SILC (protocol)

Silvio Micali

Simple Authentication and Security Layer

Simple public-key infrastructure

Simple XOR cipher

S/KEY

Skein (hash function)

Skipjack (cipher)

Slide attack

Slidex

Small subgroup confinement attack

S/MIME

SM4 algorithm (formerly SMS4) •

Snake oil (cryptography)

Snefru

SNOW

Snuffle

SOBER-128

Solitaire (cipher)

Solomon Kullback

SOSEMANUK

Special Collection Service

Spectr-H64

SPEKE (cryptography)

Sponge function

SPNEGO

Square (cipher)

Ssh-agent

SSH File Transfer Protocol

SSLeay

Stafford Tavares

Standard model (cryptography)

Station CAST

Station HYPO

Station-to-Station protocol

Statistical cryptanalysis

Stefan Lucks

Steganalysis

Steganography

Straddling checkerboard

Stream cipher

Stream cipher attacks

Strong cryptography

Strong RSA assumption

Stuart Milner-Barry

STU-II

STU-III

Stunnel

Substitution box

Substitution cipher

Substitution–permutation network

Superencryption

Supersingular isogeny key exchange

Swedish National Defence Radio Establishment

SWIFFT

SXAL/MBAL

Symmetric-key algorithm

SYSKEY

T

Tabula recta

Taher Elgamal

Tamper resistance

Tcpcrypt

Television encryption

TEMPEST

Cryptographic software

Temporal Key Integrity Protocol

Testery

Thawte

The Alphabet Cipher

The Code Book

The Codebreakers

The Gold-Bug

The Magic Words are Squeamish Ossifrage

Theory of Cryptography Conference

The world wonders

Thomas Jakobsen

Three-pass protocol

Threshold shadow scheme

TICOM

Tiger (cryptography)

Timeline of cryptography

Time/memory/data tradeoff attack

Time-based One-time Password algorithm (TOTP) •

Timing attack

Tiny Encryption Algorithm

Tom Berson

Tommy Flowers

Topics in cryptography

Tor (anonymity network)

Torus-based cryptography

Traffic analysis

Traffic-flow security

Traitor tracing

Transmission security

Transport Layer Security

Transposition cipher

Trapdoor function

Trench code

Treyfer

Trifid cipher

Triple DES

Trivium (cipher)

TrueCrypt

Truncated differential cryptanalysis

Trusted third party

Turing (cipher)

TWINKLE

TWIRL

Twofish

Two-square cipher

Type 1 encryption

Type 2 encryption

Type 3 encryption

Type 4 encryption

Typex

U

UES (cipher)

Ultra

UMAC

Unbalanced Oil and Vinegar

Undeniable signature

Unicity distance

Universal composability

Universal one-way hash function (UOWHF)

V

Venona project

Verifiable secret sharing

Verisign

Very smooth hash

VEST

VIC cipher

VideoCrypt

Vigenère cipher

Vincent Rijmen

VINSON

Virtual private network

Visual cryptography

Voynich manuscript

W

Wadsworth's cipher

WAKE

WLAN Authentication and Privacy Infrastructure

Watermark (data file)

Watermarking attack

Weak key

Web of trust

Whirlpool (hash function)

Whitfield Diffie

Wide Mouth Frog protocol

Wi-Fi Protected Access

William F. Friedman

William Montgomery (cryptographer)

WinSCP

Wired Equivalent Privacy

Wireless Transport Layer Security

Witness-indistinguishable proof

Workshop on Cryptographic Hardware and Embedded Systems

World War I cryptography

World War II cryptography

W. T. Tutte

X

X.509

XDH assumption

Xiaoyun Wang

XML Encryption

XML Signature

xmx

XSL attack

XTEA

XTR

Xuejia Lai

XXTEA

Y

Yarrow algorithm

Y-stations

Yuliang Zheng

Z

Zeroisation

Zero-knowledge password proof

Zero-knowledge proof

Zfone

Zodiac (cipher)

ZRTP

Zimmermann–Sassaman key-signing protocol

Zimmermann Telegram

See also

{{Portal|Cryptography}}
  • Outline of cryptography – an analytical list of articles and terms.
  • Books on cryptography – an annotated list of suggested readings.
  • List of cryptographers – an annotated list of cryptographers.
  • Important publications in cryptography – some cryptography papers in computer science.
  • WikiProject Cryptography – discussion and resources for editing cryptography articles.

3 : Cryptography lists and comparisons|Wikipedia indexes|Mathematics-related lists

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/27 21:23:55