Index of cryptography articles

{{Short description|none}}

Articles related to cryptography include:

A

B

C

C2Net

C-36 (cipher machine)

C-52 (cipher machine)

Caesar cipher

Camellia (cipher)

CAPICOM

Capstone (cryptography)

Cardan grille

Card catalog (cryptology)

Carlisle Adams

CAST-128

CAST-256

Cayley–Purser algorithm

CBC-MAC

CCM mode

CCMP

CD-57

CDMF

Cellular Message Encryption Algorithm

Centiban

Central Security Service

Centre for Applied Cryptographic Research

Central Bureau

Certicom

Certificate authority

Certificate-based encryption

Certificateless cryptography

Certificate revocation list

Certificate signing request

Certification path validation algorithm

Chaffing and winnowing

Challenge-Handshake Authentication Protocol

Challenge–response authentication

Chosen-ciphertext attack

Chosen-plaintext attack

CIKS-1

Cipher disk

Cipher runes

Cipher security summary

CipherSaber

Ciphertext expansion

Ciphertext indistinguishability

Ciphertext-only attack

Ciphertext stealing

CIPHERUNICORN-A

CIPHERUNICORN-E

Classical cipher

Claude Shannon

Claw-free permutation

Cleartext

CLEFIA

Clifford Cocks

Clipper chip

Clock (cryptography)

Clock drift

CMVP

COCONUT98

Codebook

Code (cryptography)

Code talker

Codress message

Cold boot attack

Collision attack

Collision resistance

Colossus computer

Combined Cipher Machine

Commitment scheme

Common Scrambling Algorithm

Communications security

Communications Security Establishment

Communication Theory of Secrecy Systems

Comparison of disk encryption software

Comparison of SSH clients

Completeness (cryptography)

Complexity trap

Computational Diffie–Hellman assumption

Computational hardness assumption

Computer insecurity

Computer and network surveillance

COMSEC equipment

Conch (SSH)

Concrete security

Conel Hugh O'Donel Alexander

Confidentiality

Confusion and diffusion

Content-scrambling system

Controlled Cryptographic Item

Corkscrew (program)

Correlation immunity

COSIC

Covert channel

Cover (telecommunications)

Crab (cipher)

Cramer–Shoup cryptosystem

CRAM-MD5

CRHF

Crib (cryptanalysis)

Crowds (anonymity network)

Crypt (C)

Cryptanalysis

Cryptanalysis of the Enigma

Cryptanalysis of the Lorenz cipher

Cryptanalytic computer

Cryptex

Cryptico

Crypto AG

Crypto-anarchism

Crypto API (Linux)

Microsoft CryptoAPI

CryptoBuddy

Cryptochannel

CRYPTO (conference)

Cryptogram

Cryptographically Generated Address

Cryptographically secure pseudorandom number generator

Cryptographically strong

Cryptographic Application Programming Interface

Cryptographic hash function

Cryptographic key types

Cryptographic Message Syntax

Cryptographic primitive

Cryptographic protocol

Cryptographic Service Provider

Cryptographie indéchiffrable

Cryptography

Cryptography in Japan

Cryptography newsgroups

Cryptography standards

Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age

Cryptologia

Cryptology ePrint Archive

Cryptology Research Society of India

Cryptomathic

Cryptome

Cryptomeria cipher

Cryptonomicon

CrypTool

Crypto phone

Crypto-society

Cryptosystem

Cryptovirology

CRYPTREC

CS-Cipher

Curve25519 Curve448 Custom hardware attack

Cycles per byte

Cyclometer

Cypherpunk

Cyrillic Projector

D

D'Agapeyeff cipher

Daniel J. Bernstein

Data Authentication Algorithm

Data Encryption Standard

Datagram Transport Layer Security

David Chaum

David Kahn

David Naccache

David Wagner

David Wheeler (computer scientist)

Davies attack

Davies–Meyer hash

DEAL

Decipherment

Decisional Diffie–Hellman assumption

Decorrelation theory

Decrypt

DeCSS

Defence Signals Directorate

Degree of anonymity

Delegated Path Discovery

Delegated Path Validation

Deniable encryption

Derek Taunt

Derived unique key per transaction

DES Challenges

DES supplementary material

DES-X

Deterministic encryption

DFC (cipher)

Dictionary attack

Differential cryptanalysis

Differential-linear attack

Differential power analysis

Diffie–Hellman key exchange

Diffie–Hellman problem

DigiCipher 2

Digital Fortress

Digital rights management

Digital signature

Digital Signature Algorithm

Digital signature forgery

Digital timestamping

Digital watermarking

Dilly Knox

Dining cryptographers problem

Diplomatic bag

Direct Anonymous Attestation

Discrete logarithm

Disk encryption

Disk encryption hardware

Disk encryption software

Distance-bounding protocol

Distinguishing attack

Distributed.net

DMA attack

dm-crypt

Dmitry Sklyarov

DomainKeys

Don Coppersmith

Dorabella Cipher

Double Ratchet Algorithm

Doug Stinson

Dragon (cipher)

DRYAD

Dual_EC_DRBG

E

F

G

H

I

J

K

L

M

N

O

P

Padding (cryptography)

Padding oracle attack

Paillier cryptosystem

Pairing-based cryptography

Panama (cryptography)

Partitioning cryptanalysis

Passive attack

Passphrase

Password

Password-authenticated key agreement

Password cracking

Password Hashing Competition

Paul Kocher

Paulo Pancatuccio

Paulo S. L. M. Barreto

Paul van Oorschot

PBKDF2

PC Bruno

Pepper (cryptography)

Perfect forward secrecy

Perforated sheets

Permutation cipher

Peter Gutmann (computer scientist)

Peter Junger

Peter Twinn

PGP Corporation

PGPDisk

PGPfone

Phelix

Phil Zimmermann

Photuris (protocol)

Physical security

Physical unclonable function

Pig Latin

Pigpen cipher

Pike (cipher)

Piling-up lemma

Pinwheel (cryptography)

Piotr Smoleński

Pirate decryption

PKC (conference)

PKCS

PKCS 11

PKCS 12

PKIX

Plaintext

Plaintext-aware encryption

Playfair cipher

Plugboard

PMAC (cryptography)

Poem code

Pohlig–Hellman algorithm

Point-to-Point Tunneling Protocol

Pointcheval–Stern signature algorithm

Poly1305

Polyalphabetic cipher

Polybius square

Portex

Post-quantum cryptography

Post-Quantum Cryptography Standardization

Power analysis

Preimage attack

Pre-shared key

Pretty Good Privacy

Printer steganography

Privacy-enhanced Electronic Mail

Private Communications Technology

Private information retrieval

Probabilistic encryption

Product cipher

Proof-of-work system

Protected Extensible Authentication Protocol

Provable security

Provably secure cryptographic hash function

Proxy re-encryption

Pseudo-Hadamard transform

Pseudonymity

Pseudorandom function

Pseudorandom number generator

Pseudorandom permutation

Public key certificate

Public-key cryptography

Public key fingerprint

Public key infrastructure

PURPLE

PuTTY

Py (cipher)

Q

R

Rabbit (cipher)

Rabin cryptosystem

Rabin–Williams encryption

RadioGatún

Rail fence cipher

Rainbow table

Ralph Merkle

Rambutan (cryptography)

Random function

Randomness tests

Random number generator attack

Random oracle

RC2

RC4

RC5

RC6

Rebound attack

Reciprocal cipher

Red/black concept

REDOC

Red Pike (cipher)

Reflector (cipher machine)

Regulation of Investigatory Powers Act 2000

Reihenschieber

Rekeying (cryptography)

Related-key attack

Replay attack

Reservehandverfahren

Residual block termination

Rijndael key schedule

Rijndael S-box

Ring signature

RIPEMD

Rip van Winkle cipher

Robert Morris (cryptographer)

Robot certificate authority

Rockex

Rolf Noskwith

Ron Rivest

Room 40

Root certificate

Ross J. Anderson

Rossignols

ROT13

Rotor machine

RSA RSA

RSA-100

RSA-1024

RSA-110

RSA-120

RSA-129

RSA-130

RSA-140

RSA-150

RSA-1536

RSA-155

RSA-160

RSA-170

RSA-180

RSA-190

RSA-200

RSA-2048

RSA-210

RSA-220

RSA-230

RSA-232

RSA-240

RSA-250

RSA-260

RSA-270

RSA-280

RSA-290

RSA-300

RSA-309

RSA-310

RSA-320

RSA-330

RSA-340

RSA-350

RSA-360

RSA-370

RSA-380

RSA-390

RSA-400

RSA-410

RSA-420

RSA-430

RSA-440

RSA-450

RSA-460

RSA-470

RSA-480

RSA-490

RSA-500

RSA-576

RSA-617

RSA-640

RSA-704

RSA-768

RSA-896

RSA-PSS

RSA Factoring Challenge

RSA problem

RSA Secret-Key Challenge

RSA Security

Rubber-hose cryptanalysis

Running key cipher

Russian copulation

S

S-1 block cipher

SAFER

Salsa20

Salt (cryptography)

SAM card

Security Support Provider Interface

SAML

SAVILLE

SC2000

Schnorr group

Schnorr signature

Schoof–Elkies–Atkin algorithm

SCIP

Scott Vanstone

Scrambler

Scramdisk

Scream (cipher)

Scrypt

Scytale

Seahorse (software)

SEAL (cipher)

Sean Murphy (cryptographer)

SECG

Secret broadcast

Secret decoder ring

Secrets and Lies (Schneier)

Secret sharing

Sectéra Secure Module

Secure access module

Secure channel

Secure Communication based on Quantum Cryptography

Secure copy

Secure cryptoprocessor

Secure Electronic Transaction

Secure Hash Algorithms

Secure Hypertext Transfer Protocol

Secure key issuing cryptography

Secure multi-party computation

Secure Neighbor Discovery

Secure Real-time Transport Protocol

Secure remote password protocol

Secure Shell

Secure telephone

Secure Terminal Equipment

Secure voice

SecurID

Security association

Security engineering

Security level

Security parameter

Security protocol notation

Security through obscurity

Security token

SEED

Selected Areas in Cryptography

Self-certifying File System

Self-shrinking generator

Self-signed certificate

Semantic security

Serge Vaudenay

Serpent (cipher)

Session key

SHACAL

Shafi Goldwasser

SHA-1

SHA-2

SHA-3

Shared secret

SHARK

Shaun Wylie

Shor's algorithm

Shrinking generator

Shugborough inscription

Side-channel attack

Siemens and Halske T52

SIGABA

SIGCUM

SIGINT

Signal Protocol

Signal Intelligence Service

Signcryption

SIGSALY

SILC (protocol)

Silvio Micali

Simple Authentication and Security Layer

Simple public-key infrastructure

Simple XOR cipher

S/KEY

Skein (hash function)

Skipjack (cipher)

Slide attack

Slidex

Small subgroup confinement attack

S/MIME

SM4 algorithm (formerly SMS4) •

Snake oil (cryptography)

Snefru

SNOW

Snuffle

SOBER-128

Solitaire (cipher)

Solomon Kullback

SOSEMANUK

Special Collection Service

Spectr-H64

SPEKE (cryptography)

Sponge function

SPNEGO

Square (cipher)

Ssh-agent Ssh-keygen SSH File Transfer Protocol

SSLeay

Stafford Tavares

Standard model (cryptography)

Station CAST

Station HYPO

Station-to-Station protocol

Statistical cryptanalysis

Stefan Lucks

Steganalysis

Steganography

Straddling checkerboard

Stream cipher

Stream cipher attacks

Strong cryptography

Strong RSA assumption

Stuart Milner-Barry

STU-II

STU-III

Stunnel

Substitution box

Substitution cipher

Substitution–permutation network

Superencryption

Supersingular isogeny key exchange

Swedish National Defence Radio Establishment

SWIFFT

SXAL/MBAL

Symmetric-key algorithm

SYSKEY

T

U

V

W

X

Y

Z

See also

Category:Cryptography lists and comparisons

Cryptography

Cryptography