Index of cryptography articles
Articles related to cryptography include:
A
•A5/2 •
ABA digital signature guidelines •
ABC •
Abraham Sinkov •
Acoustic cryptanalysis •
Adaptive chosen-ciphertext attack •
Adaptive chosen plaintext and chosen ciphertext attack •
Advantage •
ADFGVX cipher •
Adi Shamir •
Advanced Access Content System •
Advanced Encryption Standard •
Advanced Encryption Standard process •
Adversary •
AEAD block cipher modes of operation •
Affine cipher •
Agnes Meyer Driscoll •
AKA •
Akelarre •
Alan Turing •
Alastair Denniston •
Al Bhed language •
Alex Biryukov •
Alfred Menezes •
Algebraic Eraser •
Algorithmically random sequence •
Alice and Bob •
All-or-nothing transform •
Alphabetum Kaldeorum •
Alternating step generator •
American Cryptogram Association •
AN/CYZ-10 •
Anonymous publication •
Anonymous remailer •
Antoni Palluth •
Anubis •
Argon2 •
ARIA •
Arlington Hall •
Arne Beurling •
Arnold Cipher •
Array controller based encryption •
Arthur Scherbius •
Arvid Gerhard Damm •
Asiacrypt •
Atbash •
Attribute-based encryption •
Attack model •
Auguste Kerckhoffs •
Authenticated encryption •
Authentication •
Authorization certificate •
Autokey cipher •
Avalanche effect
B
•Babington Plot •
Baby-step giant-step •
Bacon's cipher •
Banburismus •
Bart Preneel •
BaseKing •
BassOmatic •
BATON •
BB84 •
Beale ciphers •
BEAR and LION ciphers •
Beaufort cipher •
Beaumanor Hall •
Bent function •
Berlekamp–Massey algorithm •
Bernstein v. United States •
BestCrypt •
Biclique attack •
BID/60 •
BID 770 •
Bifid cipher •
Bill Weisband •
Binary Goppa code •
Biometric word list •
Birthday attack •
Bit-flipping attack •
BitTorrent protocol encryption •
Biuro Szyfrów •
Black Chamber •
Blaise de Vigenère •
Bletchley Park •
Blinding •
Blind signature •
Block cipher •
Block cipher mode of operation •
Block size •
Blowfish •
Blum Blum Shub •
Blum–Goldwasser cryptosystem •
Bomba •
Bombe •
Book cipher •
Books on cryptography •
Boomerang attack •
Boris Hagelin •
Bouncy Castle •
Broadcast encryption •
Bruce Schneier •
Brute-force attack •
Brute Force: Cracking the Data Encryption Standard •
Burrows–Abadi–Needham logic •
Burt Kaliski
C
•C-36 •
C-52 •
Caesar cipher •
Camellia •
CAPICOM •
Capstone •
Cardan grille •
Card catalog •
Carlisle Adams •
CAST-128 •
CAST-256 •
Cayley–Purser algorithm •
CBC-MAC •
CCM mode •
CCMP •
CD-57 •
CDMF •
Cellular Message Encryption Algorithm •
Centiban •
Central Security Service •
Centre for Applied Cryptographic Research •
Central Bureau •
Certicom •
Certificate authority •
Certificate-based encryption •
Certificateless cryptography •
Certificate revocation list •
Certificate signing request •
Certification path validation algorithm •
Chaffing and winnowing •
Challenge-Handshake Authentication Protocol •
Challenge–response authentication •
Chosen-ciphertext attack •
Chosen-plaintext attack •
CIKS-1 •
Cipher disk •
Cipher runes •
Cipher security summary •
CipherSaber •
Ciphertext expansion •
Ciphertext indistinguishability •
Ciphertext-only attack •
Ciphertext stealing •
CIPHERUNICORN-A •
CIPHERUNICORN-E •
Classical cipher •
Claude Shannon •
Claw-free permutation •
Cleartext •
CLEFIA •
Clifford Cocks •
Clipper chip •
Clock •
Clock drift •
CMVP •
COCONUT98 •
Codebook •
Code •
Code talker •
Codress message •
Cold boot attack •
Collision attack •
Collision resistance •
Colossus computer •
Combined Cipher Machine •
Commitment scheme •
Common Scrambling Algorithm •
Communications security •
Communications Security Establishment •
Communication Theory of Secrecy Systems •
Comparison of disk encryption software •
Comparison of SSH clients •
Completeness •
Complexity trap •
Computational Diffie–Hellman assumption •
Computational hardness assumption •
Computer insecurity •
Computer and network surveillance •
COMSEC equipment •
Conch •
Concrete security •
Conel Hugh O'Donel Alexander •
Confidentiality •
Confusion and diffusion •
Content Scramble System •
Controlled Cryptographic Item •
Corkscrew •
Correlation immunity •
COSIC •
Covert channel •
Cover •
Crab •
Cramer–Shoup cryptosystem •
CRAM-MD5 •
CRHF •
Crib •
Crowds •
Crypt •
Cryptanalysis •
Cryptanalysis of the Enigma •
Cryptanalysis of the Lorenz cipher •
Cryptanalytic computer •
Cryptex •
Cryptico •
Crypto AG •
Crypto-anarchism •
Crypto API •
Microsoft CryptoAPI •
CryptoBuddy •
Cryptochannel •
CRYPTO •
Cryptogram •
Cryptographically Generated Address •
Cryptographically secure pseudorandom number generator •
Cryptographically strong •
Cryptographic Application Programming Interface •
Cryptographic hash function •
Cryptographic key types •
Cryptographic Message Syntax •
Cryptographic primitive •
Cryptographic protocol •
Cryptographic Service Provider •
Cryptographie indéchiffrable •
Cryptography •
Cryptography in Japan •
Cryptography newsgroups •
Cryptography standards •
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age •
Cryptologia •
Cryptology ePrint Archive •
Cryptology Research Society of India •
Cryptomathic •
Cryptome •
Cryptomeria cipher •
Cryptonomicon •
CrypTool •
Crypto-society •
Cryptosystem •
Cryptovirology •
CRYPTREC •
CS-Cipher •
Curve25519 • Curve448 • Custom hardware attack •
Cycles per byte •
Cyclometer •
Cypherpunk •
Cyrillic Projector
D
•Daniel J. Bernstein •
Data Authentication Algorithm •
Data Encryption Standard •
Datagram Transport Layer Security •
David Chaum •
David Kahn •
David Naccache •
David Wagner •
David Wheeler •
Davies attack •
Davies–Meyer hash •
DEAL •
Decipherment •
Decisional Diffie–Hellman assumption •
Decorrelation theory •
Decrypt •
DeCSS •
Defence Signals Directorate •
Degree of anonymity •
Delegated Path Discovery •
Delegated Path Validation •
Deniable encryption •
Derek Taunt •
Derived unique key per transaction •
DES Challenges •
DES supplementary material •
DES-X •
Deterministic encryption •
DFC •
Dictionary attack •
Differential cryptanalysis •
Differential-linear attack •
Differential power analysis •
Diffie–Hellman key exchange •
Diffie–Hellman problem •
DigiCipher 2 •
Digital Fortress •
Digital rights management •
Digital signature •
Digital Signature Algorithm •
Digital signature forgery •
Digital timestamping •
Digital watermarking •
Dilly Knox •
Dining cryptographers problem •
Diplomatic bag •
Direct Anonymous Attestation •
Discrete logarithm •
Disk encryption •
Disk encryption hardware •
Disk encryption software •
Distance-bounding protocol •
Distinguishing attack •
Distributed.net •
DMA attack •
dm-crypt •
Dmitry Sklyarov •
DomainKeys •
Don Coppersmith •
Dorabella Cipher •
Double Ratchet Algorithm •
Doug Stinson •
Dragon •
DRYAD •
Dual_EC_DRBG
E
•E2 •
E4M •
EAP-AKA •
EAP-SIM •
EAX mode •
ECC patents •
ECHELON •
ECRYPT •
Edouard Fleissner von Wostrowitz •
Edward Hebern •
Edward Scheidt •
Edward Travis •
EFF DES cracker •
Efficient Probabilistic Public-Key Encryption Scheme •
EKMS •
Electronic Communications Act 2000 •
Electronic money •
Electronic signature •
Electronic voting •
ElGamal encryption •
ElGamal signature scheme •
Eli Biham •
Elizebeth Friedman •
Elliptic-curve cryptography •
Elliptic-curve Diffie–Hellman •
Elliptic Curve DSA • EdDSA • Elliptic curve only hash •
Elonka Dunin •
Encrypted function •
Encrypted key exchange •
Encrypting File System •
Encryption •
Encryption software •
Enigmail •
Enigma machine •
Enigma rotor details •
Entrust •
Ernst Fetterlein •
eSTREAM •
Étienne Bazeries •
Eurocrypt •
EuroCrypt •
Export of cryptography •
Extensible Authentication Protocol
F
•Fast syndrome-based hash •
FEA-M •
FEAL •
Feige–Fiat–Shamir identification scheme •
Feistel cipher •
Félix Delastelle •
Fialka •
Filesystem-level encryption •
FileVault •
Fill device •
Financial cryptography •
FIPS 140 •
FIPS 140-2 •
Firefly •
FISH •
Fish •
Floradora •
Fluhrer, Mantin and Shamir attack •
Format-preserving encryption •
Fortezza •
Fort George G. Meade •
Fortuna •
Four-square cipher •
Franciszek Pokorny •
Frank A. Stevenson •
Frank Rowlett •
Freenet •
FreeOTFE •
FreeS/WAN •
Frequency analysis •
Friedrich Kasiski •
Fritz-chip •
FROG •
FROSTBURG •
FTP over SSH •
Full disk encryption •
Full Domain Hash •
F. W. Winterbotham
G
•Gardening •
GCHQ Bude •
GCHQ CSO Morwenstow •
GDES •
Generic Security Services Application Program Interface •
George Blakley •
George Scovell •
GGH encryption scheme •
GGH signature scheme •
Gilbert Vernam •
GMR •
GNU Privacy Guard •
GnuTLS •
Goldwasser–Micali cryptosystem •
Gordon Welchman •
GOST •
GOST •
Government Communications Headquarters •
Government Communications Security Bureau •
Grain •
Grand Cru •
Great Cipher •
Grill •
Grille •
Group-based cryptography •
Group signature •
Grover's algorithm •
Gustave Bertrand •
Gwido Langer
H
•HAIFA construction •
HAIPE •
Hans Dobbertin •
Hans-Thilo Schmidt •
Hard-core predicate •
Hardware random number generator •
Hardware security module •
Harold Keen •
Harry Hinsley •
Harvest •
HAS-160 •
Hash-based cryptography •
Hashcash •
Hash chain •
Hash function security summary •
Hash list •
Hasty Pudding cipher •
HAVAL •
HC-256 •
HC-9 •
Heath Robinson •
Hebern rotor machine •
Henri Braquenié •
Henryk Zygalski •
Herbert Yardley •
Hidden Field Equations •
Hideki Imai •
Hierocrypt •
High-bandwidth Digital Content Protection •
Higher-order differential cryptanalysis •
Hill cipher •
History of cryptography •
HMAC •
HMAC-based One-time Password algorithm •
Horst Feistel •
Howard Heys •
Https •
Hugo Hadwiger •
Hugo Koch •
Hushmail •
Hut 6 •
Hut 8 •
HX-63 •
Hybrid cryptosystem •
Hyperelliptic curve cryptography •
Hyper-encryption