Index of cryptography articles
{{Short description|none}}
Articles related to cryptography include:
A
A5/1 •
A5/2 •
ABA digital signature guidelines •
Adaptive chosen-ciphertext attack •
Adaptive chosen plaintext and chosen ciphertext attack •
Advanced Access Content System •
Advanced Encryption Standard •
Advanced Encryption Standard process •
AEAD block cipher modes of operation •
Algorithmically random sequence •
American Cryptogram Association •
Argon2 •
Array controller based encryption •
Atbash •
B
C
C2Net •
CAPICOM •
CAST-128 •
CAST-256 •
CBC-MAC •
CCM mode •
CCMP •
CD-57 •
CDMF •
Cellular Message Encryption Algorithm •
Centiban •
Centre for Applied Cryptographic Research •
Certicom •
Certificate-based encryption •
Certificateless cryptography •
Certification path validation algorithm •
Challenge-Handshake Authentication Protocol •
Challenge–response authentication •
CIKS-1 •
Ciphertext indistinguishability •
CLEFIA •
CMVP •
Codebook •
Communications Security Establishment •
Communication Theory of Secrecy Systems •
Comparison of disk encryption software •
Computational Diffie–Hellman assumption •
Computational hardness assumption •
Computer and network surveillance •
Conel Hugh O'Donel Alexander •
Controlled Cryptographic Item •
COSIC •
CRAM-MD5 •
CRHF •
Cryptanalysis of the Lorenz cipher •
Cryptex •
Cryptico •
Cryptographically Generated Address •
Cryptographically secure pseudorandom number generator •
Cryptographic Application Programming Interface •
Cryptographic Message Syntax •
Cryptographic Service Provider •
Cryptographie indéchiffrable •
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age •
Cryptology Research Society of India •
Cryptome •
CrypTool •
CRYPTREC •
D
E
E4M •
EAP-AKA •
EAP-SIM •
EAX mode •
ECHELON •
ECRYPT •
Edouard Fleissner von Wostrowitz •
Efficient Probabilistic Public-Key Encryption Scheme •
EKMS •
Electronic Communications Act 2000 •
Elliptic-curve Diffie–Hellman •
Elliptic Curve DSA • EdDSA • Elliptic curve only hash •
Enigmail •
Entrust •
eSTREAM •
F
G
H
H.235 •
HAIPE •
Hardware random number generator •
HAS-160 •
Hashcash •
Hash function security summary •
HAVAL •
HC-256 •
HC-9 •
Heath Robinson (codebreaking machine) •
High-bandwidth Digital Content Protection •
Higher-order differential cryptanalysis •
HMAC •
HMAC-based One-time Password algorithm (HOTP) •
Https •
Hushmail •
Hut 6 •
Hut 8 •
HX-63 •
I
IBM 4758 •
IDEA NXT •
Identification friend or foe •
Impossible differential cryptanalysis •
Indifferent chosen-ciphertext attack •
Indistinguishability obfuscation •
Information-theoretic security •
Integrated Encryption Scheme •
Integrated Windows Authentication •
Intermediate certificate authorities •
International Association for Cryptologic Research •
International Data Encryption Algorithm •
Internet Security Association and Key Management Protocol •
IPsec •
J
K
L
Lacida •
LCS35 •
Linear-feedback shift register •
List of cryptographic file systems •
List of cryptographic key types •
List of cryptology conferences •
List of telecommunications encryption terms • List of people associated with Bletchley Park •
List of SFTP server software •
LOKI •
LOKI97 •
Lsh •
M
N
O
P
Password •
Password-authenticated key agreement •
Password Hashing Competition •
PBKDF2 •
PC Bruno •
Peter Gutmann (computer scientist) •
PGPDisk •
PGPfone •
Phelix •
Physical unclonable function •
PKCS •
PKCS 11 •
PKCS 12 •
PKIX •
Point-to-Point Tunneling Protocol •
Pointcheval–Stern signature algorithm •
Poly1305 •
Post-Quantum Cryptography Standardization •
Privacy-enhanced Electronic Mail •
Private Communications Technology •
Private information retrieval •
Protected Extensible Authentication Protocol •
Provably secure cryptographic hash function •
Pseudorandom number generator •
PURPLE •
PuTTY •
Q
R
Random number generator attack •
RC2 •
RC4 •
RC5 •
RC6 •
REDOC •
Regulation of Investigatory Powers Act 2000 •
RIPEMD •
Robert Morris (cryptographer) •
Rockex •
Room 40 •
ROT13 •
RSA-100 •
RSA-1024 •
RSA-110 •
RSA-120 •
RSA-129 •
RSA-130 •
RSA-140 •
RSA-150 •
RSA-1536 •
RSA-155 •
RSA-160 •
RSA-170 •
RSA-180 •
RSA-190 •
RSA-200 •
RSA-2048 •
RSA-210 •
RSA-220 •
RSA-230 •
RSA-232 •
RSA-240 •
RSA-250 •
RSA-260 •
RSA-270 •
RSA-280 •
RSA-290 •
RSA-300 •
RSA-309 •
RSA-310 •
RSA-320 •
RSA-330 •
RSA-340 •
RSA-350 •
RSA-360 •
RSA-370 •
RSA-380 •
RSA-390 •
RSA-400 •
RSA-410 •
RSA-420 •
RSA-430 •
RSA-440 •
RSA-450 •
RSA-460 •
RSA-470 •
RSA-480 •
RSA-490 •
RSA-500 •
RSA-576 •
RSA-617 •
RSA-640 •
RSA-704 •
RSA-768 •
RSA-896 •
RSA-PSS •
S
SAFER •
Salsa20 •
SAM card •
Security Support Provider Interface •
SAML •
SAVILLE •
SC2000 •
Schoof–Elkies–Atkin algorithm •
SCIP •
Scrypt •
Scytale •
SECG •
Secure Communication based on Quantum Cryptography •
Secure Electronic Transaction •
Secure Hypertext Transfer Protocol •
Secure key issuing cryptography •
Secure multi-party computation •
Secure Real-time Transport Protocol •
Secure remote password protocol •
SecurID •
SEED •
Selected Areas in Cryptography •
SHACAL •
SHA-1 •
SHA-2 •
SHA-3 •
SHARK •
SIGABA •
SIGCUM •
SIGINT •
SIGSALY •
Simple Authentication and Security Layer •
Simple public-key infrastructure •
S/KEY •
Slidex •
Small subgroup confinement attack •
S/MIME •
SM4 algorithm (formerly SMS4) •
Snefru •
SNOW •
Snuffle •
SPNEGO •
Ssh-agent • Ssh-keygen • SSH File Transfer Protocol •
SSLeay •
Standard model (cryptography) •
STU-II •
STU-III •
Stunnel •
Substitution–permutation network •
Supersingular isogeny key exchange •
Swedish National Defence Radio Establishment •
SWIFFT •
T
Tcpcrypt •
TEMPEST •
Template:Cryptographic software •
Temporal Key Integrity Protocol •
Testery •
Thawte •
The Magic Words are Squeamish Ossifrage •
Theory of Cryptography Conference •
TICOM •
Time/memory/data tradeoff attack •
Time-based One-time Password algorithm (TOTP) •
Treyfer •
Truncated differential cryptanalysis •
TWINKLE •
TWIRL •
Twofish •
U
V
W
X
Y
Z
See also
- Outline of cryptography – an analytical list of articles and terms.
- Books on cryptography – an annotated list of suggested readings.
- List of cryptographers – an annotated list of cryptographers.
- WikiProject Cryptography – discussion and resources for editing cryptography articles.