Index of cryptography articles


Articles related to cryptography include:

A


A5/2
ABA digital signature guidelines
ABC •
Abraham Sinkov
Acoustic cryptanalysis
Adaptive chosen-ciphertext attack
Adaptive chosen plaintext and chosen ciphertext attack
Advantage •
ADFGVX cipher
Adi Shamir
Advanced Access Content System
Advanced Encryption Standard
Advanced Encryption Standard process
Adversary
AEAD block cipher modes of operation
Affine cipher
Agnes Meyer Driscoll
AKA •
Akelarre •
Alan Turing
Alastair Denniston
Al Bhed language
Alex Biryukov
Alfred Menezes
Algebraic Eraser
Algorithmically random sequence
Alice and Bob
All-or-nothing transform
Alphabetum Kaldeorum
Alternating step generator
American Cryptogram Association
AN/CYZ-10
Anonymous publication
Anonymous remailer
Antoni Palluth
Anubis •
Argon2
ARIA •
Arlington Hall
Arne Beurling
Arnold Cipher
Array controller based encryption
Arthur Scherbius
Arvid Gerhard Damm
Asiacrypt
Atbash
Attribute-based encryption
Attack model
Auguste Kerckhoffs
Authenticated encryption
Authentication
Authorization certificate
Autokey cipher
Avalanche effect

B


Babington Plot
Baby-step giant-step
Bacon's cipher
Banburismus
Bart Preneel
BaseKing
BassOmatic
BATON
BB84
Beale ciphers
BEAR and LION ciphers
Beaufort cipher
Beaumanor Hall
Bent function
Berlekamp–Massey algorithm
Bernstein v. United States •
BestCrypt
Biclique attack
BID/60
BID 770
Bifid cipher
Bill Weisband
Binary Goppa code
Biometric word list
Birthday attack
Bit-flipping attack
BitTorrent protocol encryption
Biuro Szyfrów
Black Chamber
Blaise de Vigenère
Bletchley Park
Blinding •
Blind signature
Block cipher
Block cipher mode of operation
Block size •
Blowfish •
Blum Blum Shub
Blum–Goldwasser cryptosystem
Bomba •
Bombe
Book cipher
Books on cryptography
Boomerang attack
Boris Hagelin
Bouncy Castle •
Broadcast encryption
Bruce Schneier
Brute-force attack
Brute Force: Cracking the Data Encryption Standard
Burrows–Abadi–Needham logic
Burt Kaliski

C


C-36 •
C-52 •
Caesar cipher
Camellia •
CAPICOM
Capstone •
Cardan grille
Card catalog •
Carlisle Adams
CAST-128
CAST-256
Cayley–Purser algorithm
CBC-MAC
CCM mode
CCMP
CD-57
CDMF
Cellular Message Encryption Algorithm
Centiban
Central Security Service
Centre for Applied Cryptographic Research
Central Bureau
Certicom
Certificate authority
Certificate-based encryption
Certificateless cryptography
Certificate revocation list
Certificate signing request
Certification path validation algorithm
Chaffing and winnowing
Challenge-Handshake Authentication Protocol
Challenge–response authentication
Chosen-ciphertext attack
Chosen-plaintext attack
CIKS-1
Cipher disk
Cipher runes
Cipher security summary
CipherSaber
Ciphertext expansion
Ciphertext indistinguishability
Ciphertext-only attack
Ciphertext stealing
CIPHERUNICORN-A
CIPHERUNICORN-E
Classical cipher
Claude Shannon
Claw-free permutation
Cleartext
CLEFIA
Clifford Cocks
Clipper chip
Clock •
Clock drift
CMVP
COCONUT98
Codebook
Code •
Code talker
Codress message
Cold boot attack
Collision attack
Collision resistance
Colossus computer
Combined Cipher Machine
Commitment scheme
Common Scrambling Algorithm
Communications security
Communications Security Establishment
Communication Theory of Secrecy Systems
Comparison of disk encryption software
Comparison of SSH clients
Completeness •
Complexity trap
Computational Diffie–Hellman assumption
Computational hardness assumption
Computer insecurity
Computer and network surveillance
COMSEC equipment
Conch •
Concrete security
Conel Hugh O'Donel Alexander
Confidentiality
Confusion and diffusion
Content Scramble System
Controlled Cryptographic Item
Corkscrew •
Correlation immunity
COSIC
Covert channel
Cover •
Crab •
Cramer–Shoup cryptosystem
CRAM-MD5
CRHF
Crib •
Crowds •
Crypt •
Cryptanalysis
Cryptanalysis of the Enigma
Cryptanalysis of the Lorenz cipher
Cryptanalytic computer
Cryptex
Cryptico
Crypto AG
Crypto-anarchism
Crypto API •
Microsoft CryptoAPI
CryptoBuddy
Cryptochannel
CRYPTO •
Cryptogram
Cryptographically Generated Address
Cryptographically secure pseudorandom number generator
Cryptographically strong
Cryptographic Application Programming Interface
Cryptographic hash function
Cryptographic key types
Cryptographic Message Syntax
Cryptographic primitive
Cryptographic protocol
Cryptographic Service Provider
Cryptographie indéchiffrable
Cryptography
Cryptography in Japan
Cryptography newsgroups
Cryptography standards
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age
Cryptologia
Cryptology ePrint Archive
Cryptology Research Society of India
Cryptomathic
Cryptome
Cryptomeria cipher
Cryptonomicon
CrypTool
Crypto-society
Cryptosystem
Cryptovirology
CRYPTREC
CS-Cipher
Curve25519Curve448Custom hardware attack
Cycles per byte
Cyclometer
Cypherpunk
Cyrillic Projector

D


Daniel J. Bernstein •
Data Authentication Algorithm
Data Encryption Standard
Datagram Transport Layer Security
David Chaum
David Kahn
David Naccache
David Wagner
David Wheeler •
Davies attack
Davies–Meyer hash
DEAL
Decipherment
Decisional Diffie–Hellman assumption
Decorrelation theory
Decrypt
DeCSS
Defence Signals Directorate
Degree of anonymity
Delegated Path Discovery
Delegated Path Validation
Deniable encryption
Derek Taunt
Derived unique key per transaction
DES Challenges
DES supplementary material
DES-X
Deterministic encryption
DFC •
Dictionary attack
Differential cryptanalysis
Differential-linear attack
Differential power analysis
Diffie–Hellman key exchange
Diffie–Hellman problem
DigiCipher 2
Digital Fortress
Digital rights management
Digital signature
Digital Signature Algorithm
Digital signature forgery
Digital timestamping
Digital watermarking
Dilly Knox
Dining cryptographers problem
Diplomatic bag
Direct Anonymous Attestation
Discrete logarithm
Disk encryption
Disk encryption hardware
Disk encryption software
Distance-bounding protocol
Distinguishing attack
Distributed.net •
DMA attack
dm-crypt
Dmitry Sklyarov
DomainKeys
Don Coppersmith
Dorabella Cipher
Double Ratchet Algorithm
Doug Stinson
Dragon •
DRYAD
Dual_EC_DRBG

E


E2 •
E4M
EAP-AKA
EAP-SIM
EAX mode
ECC patents
ECHELON
ECRYPT
Edouard Fleissner von Wostrowitz
Edward Hebern
Edward Scheidt
Edward Travis
EFF DES cracker
Efficient Probabilistic Public-Key Encryption Scheme
EKMS
Electronic Communications Act 2000
Electronic money
Electronic signature
Electronic voting
ElGamal encryption
ElGamal signature scheme
Eli Biham
Elizebeth Friedman
Elliptic-curve cryptography
Elliptic-curve Diffie–Hellman
Elliptic Curve DSAEdDSAElliptic curve only hash
Elonka Dunin
Encrypted function
Encrypted key exchange
Encrypting File System
Encryption
Encryption software
Enigmail
Enigma machine
Enigma rotor details
Entrust
Ernst Fetterlein
eSTREAM
Étienne Bazeries
Eurocrypt
EuroCrypt
Export of cryptography
Extensible Authentication Protocol

F


Fast syndrome-based hash
FEA-M
FEAL
Feige–Fiat–Shamir identification scheme
Feistel cipher
Félix Delastelle
Fialka
Filesystem-level encryption
FileVault
Fill device
Financial cryptography
FIPS 140
FIPS 140-2
Firefly •
FISH •
Fish •
Floradora
Fluhrer, Mantin and Shamir attack
Format-preserving encryption
Fortezza
Fort George G. Meade •
Fortuna •
Four-square cipher
Franciszek Pokorny
Frank A. Stevenson •
Frank Rowlett
Freenet
FreeOTFE
FreeS/WAN
Frequency analysis
Friedrich Kasiski
Fritz-chip
FROG
FROSTBURG
FTP over SSH
Full disk encryption
Full Domain Hash
F. W. Winterbotham

G


Gardening •
GCHQ Bude
GCHQ CSO Morwenstow
GDES
Generic Security Services Application Program Interface
George Blakley
George Scovell
GGH encryption scheme
GGH signature scheme
Gilbert Vernam
GMR •
GNU Privacy Guard
GnuTLS
Goldwasser–Micali cryptosystem
Gordon Welchman
GOST •
GOST •
Government Communications Headquarters
Government Communications Security Bureau
Grain •
Grand Cru •
Great Cipher
Grill •
Grille •
Group-based cryptography
Group signature
Grover's algorithm
Gustave Bertrand
Gwido Langer

H


HAIFA construction
HAIPE
Hans Dobbertin
Hans-Thilo Schmidt
Hard-core predicate
Hardware random number generator
Hardware security module
Harold Keen
Harry Hinsley
Harvest •
HAS-160
Hash-based cryptography
Hashcash
Hash chain
Hash function security summary
Hash list
Hasty Pudding cipher
HAVAL
HC-256
HC-9
Heath Robinson •
Hebern rotor machine
Henri Braquenié
Henryk Zygalski
Herbert Yardley
Hidden Field Equations
Hideki Imai
Hierocrypt
High-bandwidth Digital Content Protection
Higher-order differential cryptanalysis
Hill cipher
History of cryptography
HMAC
HMAC-based One-time Password algorithm
Horst Feistel
Howard Heys
Https
Hugo Hadwiger
Hugo Koch
Hushmail
Hut 6
Hut 8
HX-63
Hybrid cryptosystem
Hyperelliptic curve cryptography
Hyper-encryption