User:Skysmith/Missing topics about Cryptography
Missing topics about Cryptography
Terms
- A-distance - {{search|A-distance}}
- adaptive chosen ciphertext - {{search|adaptive chosen ciphertext}}
- adaptive chosen plaintext - {{search|adaptive chosen plaintext}}
- Agent authentication - {{search|Agent authentication}}
- Aggregate signature - {{search|Aggregate signature}}
- Application cryptogram - {{search|application cryptogram}}
- auctioneer role - {{search|auctioneer role}}
- authorization architecture - {{search|authorization architecture}}
- authorization policy - {{search|authorization policy}}
- automatic clearance house - {{search|automatic clearance house}}
- blind watermarking - {{search|blind watermarking}}
- blinding technique - {{search|blinding techniques}}
- bridge certification authority - {{search|bridge certification authority}}
- Bust (cryptography) - {{search|Bust (cryptography)}}
- Canonical 8-expression - {{search|Canonical 8-expression}}
- Captured agent trust - {{search|Captured agent trust}}
- Carry-forward verification - {{search|Carry-forward verification}}
- Challenge-response identification - {{search|Challenge-response identification}}
- Cipher alphabet - {{search|Cipher alphabet}}
- Cipher Encoder cipher encoder - {{search|cipher encoder}}
- cipher key - {{search|cipher key}}
- classical cryptosystem - {{search|classical cryptosystem}}
- clip scheme - {{search|clip scheme}}
- combination criteria - {{search|combination criteria}}
- communication channel anonymity - {{search|communication channel anonymity}}
- compromising emanations - {{search|compromising emanations}}
- contract signing - {{search|contract signing}}
- control vector - {{search|control vector}}
- Core Messaging Platform - {{search|Core Messaging Platform}}
- correlation immunity and resilient Boolean functions - {{search|correlation immunity and resilient Boolean functions}}
- Counter Mode - {{search|Counter Mode}}
- Cryptodate - {{search|Cryptodate}}
- Cryptoequipment - {{search|Cryptoequipment}}
- Cryptographic contests cryptographic contest - {{search|Cryptographic contest}}
- Cryptographic freedom - {{search|Cryptographic freedom}}
- Cryptographic function - {{search|Cryptographic function}}
- Cryptographic hardware - {{search|Cryptographic hardware}}
- Cryptographic information - {{search|Cryptographic information}}
- Cryptographic policy - {{search|Cryptographic policy}}
- Cryptographically weak - {{search|Cryptographically weak}}
- Cryptologic Technician Communications - {{search|Cryptologic Technician Communications}}
- Cryptomaterial - {{search|Cryptomaterial}}
- Cryptonet - {{search|Cryptonet}}
- Cryptopart - {{search|Cryptopart}}
- Cryptoprinciple - {{search|Cryptoprinciple}}
- Cryptosecurity - {{search|Cryptosecurity}}
- Cryptoservice - {{search|Cryptoservice}}
- cut-and-choose protocol - {{search|cut-and-choose protocol}}
- Data seal - {{search|Data Seal}}
- decryption exponent - {{search|decryption exponent}}
- Decrypts - {{search|Decrypts}}
- derived key - {{search|derived key}}
- Derived Test Requirements - {{search|Derived Test Requirements}}
- designated confirmer - {{search|designated confirmer}}
- Differential Workfactor Cryptography - {{search|Differential Workfactor Cryptography}}
- digital stenography - {{search|digital stenography}}
- disgraphic substitution - {{search|disgraphic substitution}}
- domain parameter - {{search|domain parameter}}
- Doubletalk code - {{search|Doubletalk code}}
- electronic cases - {{search|electronic cases}}
- Electronics codebook mode (ECB) - {{search|Electronics codebook mode}}
- elliptic curve key - {{search|elliptic curve key}}
- elliptic curves for primarily proving - {{search|elliptic curves for primarily proving}}
- Enciphered code - {{search|Enciphered code}}
- endomorphic cryptosystem - {{search|endomorphic cryptosystem}}
- entity authentication - {{search|entity authentication}}
- exponential security - {{search|exponential security}}
- fail-stop signature - {{search|fail-stop signature}}
- fair exchange - {{search|fair exchange}}
- Falois field - {{search|Falois field}}
- field polynomial - {{search|field polynomial}}
- filter generator - {{search|filter generator}}
- fixed-base exponentiation - {{search|fixed-base exponentiation}}
- fixed-exponent exponentiation - {{search|fixed-exponent exponentiation}}
- Givierge's maxim - {{search|Givierge's maxim}}
- glue logic design - {{search|glue logic design}}
- Group key agreement - {{search|Group key agreement}}
- High grade cryptosystem - {{search|High grade cryptosystem}}
- identity verification protocol - {{search|identity verification protocol}}
- Integrated equipment - {{search|Integrated equipment}}
- interactive argument - {{search|interactive argument}}
- inversion attack - {{search|inversion attack}}
- inversion in finite fields and rings - {{search|inversion in finite fields and rings}}
- Layered Subset Difference - {{search|Layered Subset Difference}}
- linear complexity - {{search|linear complexity}}
- Low-grade cryptosystem - {{search|Low-grade cryptosystem}}
- m-resilient - {{search|m-resilient}}
- Manipulation Detection Code (MDC) - {{search|Manipulation Detection Code}}
- markle tree - {{search|markle tree}}
- maximal-length linear sequence - {{search|maximal-length linear sequence}}
- Message parts - {{search|Message parts}}
- MIPS-year - {{search|MIPS-year}}
- modular root - {{search|modular root}}
- Multiple anagramming - {{search|Multiple anagramming}}
- Multiple channel cryptography - {{search|Multiple channel cryptography}}
- Multiprecision multiplier - {{search|Multiprecision multiplier}}
- multiprecision squaring - {{search|multiprecision squaring}}
- nomendator - {{search|nomendator}}
- noninteractive proof - {{search|noninteractive proof}}
- nonmalleable - {{search|nonmalleable}}
- Open code (cryptography) - {{search|Open code (cryptography)}}
- optimal extension field - {{search|optimal extension field}}
- optimal extension - {{search|optimal extension}}
- overspender detection - {{search|overspender detection}}
- overspending prevention - {{search|overspending prevention}}
- paillier assumption - {{search|paillier assumption}}
- pastry dough mixing - {{search|pastry dough mixing}}
- physical attack (cryptography) - {{search|physical attack (cryptography)}}
- playback control - {{search|playback control}}
- Police Administration Point - {{search|Police Administration Point}}
- Pontifex (cryptography) - {{search|Pontifex (cryptography)}}
- Pre-charged dual rail logic - {{search|pre-charged dual rail logic}}
- PRIMAlity problem - {{search|PRIMAlity problem}}
- Primality proving algorithm - {{search|primality proving algorithm}}
- Prime generation - {{search|prime generation}}
- probability primality test - {{search|probability primality test}}
- pseudo-Mersenne prime - {{search|pseudo-Mersenne prime}}
- public key proxy signature - {{search|public key proxy signature}}
- quadratic residuality problem - {{search|quadratic residuality problem}}
- random bit generation - {{search|random bit generation}}
- Random key - {{search|Random key}}
- reactive defense password - {{search|reactive defense password}}
- recipient anonymity - {{search|recipient anonymity}}
- relativity prime - {{search|relativity prime}}
- right-to-left exponentiation - {{search|right-to-left exponentiation}}
- Room circuit - {{search|Room circuit}}
- secret sharing scheme - {{search|secret sharing scheme}}
- Secure authentication - {{search|Secure authentication}}
- security evaluation criteria - {{search|security evaluation criteria}}
- security standards activation - {{search|security standards activation}}
- Self-Decrypting Archive - {{search|Self-Decrypting Archive}}
- self-shrinking generation - {{search|self-shrinking generation}}
- sender anonymity - {{search|sender anonymity}}
- side-channel analysis - {{search|side-channel analysis}}
- Signal center - {{search|Signal center}}
- Signal security - {{search|Signal security}}
- signed digit exponentiation - {{search|signed digit exponentiation}}
- simultaneous exponentiation - {{search|simultaneous exponentiation}}
- sliding window exponentiation - {{search|sliding window exponentiation}}
- Structural cryptanalysis - {{search|Structural cryptanalysis}}
- symmetric cryptosystem - {{search|symmetric cryptosyste}}
- T method - {{search|T method}}
- Tamper response - {{search|Tamper response}}
- Target LFSR - {{search|Target LFSR}}
- Target of Evaluation - {{search|Target of Evaluation}}
- Threshold signature - {{search|Threshold signature}}
- time-stamping - {{search|time-stamping}}
- Trusted center - {{search|Trusted Center}}
- unlinkability - {{search|unlinkability}}
- untraceability - {{search|untraceability}}
- user authentication - {{search|user authentication}}
- witness hiding - {{search|witness hiding}}
- Workfactor Reduction Field - {{search|Workfactor Reduction Field}}
- zero-K knowledge - {{search|zero-K knowledge}}
- Zeroice – {{search|Zeroice}}
- Zig-zag exhaustion – {{search|Zig-zag exhaustion}}
Algorithms
- Cohen-Lenstra-Bosma algorithm - {{search|Cohen-Lenstra-Bosma algorithm}}
- Collision-Resistant Hash Function - {{search|Collision-Resistant Hash Function}}
- Davies-Meyer hash function - {{search|Davies-Meyer hash function}}
- exponentiation algorithm - {{search|exponentiation algorithm}}
- Fujiwara-Okomoto transform - {{search|Fujiwara-Okomoto transform}}
- Hoh-Tsjujii inversion algorithm - {{search|Hoh-Tsjujii inversion algorithm}}
- Knoth-Schroeppel function - {{search|Knoth-Schroeppel function}}
- Lahmer's Euclidean algorithm - {{search|Lahmer's Euclidean algorithm}}
- MAC algorithm - {{search|MAC algorithm}}
- Meyer's-Schilling hash function - {{search|Meyer's-Schilling hash function}}
- Miyaguchi-Preneel hash function - {{search|Miyaguchi-Preneel hash function}}
- Modular Arithmetic Security Hash - {{search|Modular Arithmetic Security Hash}}
- MonPro algorithm – {{search|MonPro algorithm}}
- Most Advanced Cryptographic Algorithm - {{search|Most Advanced Cryptographic Algorithm}}
- random Davies-Meyer hash function - {{search|random Davies-Meyer hash function}}
- Satoh's algorithm - {{search|Satoh's algorithm}}
- School's algorithm - {{search|School's algorithm}}
- Shaw-Taylor's algorithm - {{search|Shaw-Taylor's algorithm}}
- Software-optimized Encryption Algorithm - {{search|Software-optimized Encryption Algorithm}}
- Steiner's algorithm - {{search|Steiner's algorithm}}
Ciphers
- Field cipher - {{search|Field cipher}}
- Hydra Cipher - {{search|Hydra Cipher}}
- J-19 (Japanese code) - {{search|J-19 (Japanese code)}}
- self-synchronising stream cipher - {{search|self-synchronising stream cipher}}
- synchronous stream cipher - {{search|synchronous stream cipher}}
Encryption
- Beaufort encryption - {{search|Beaufort encryption}}
- Berlekamp Q-matrix - {{search|Berlekamp Q-matrix}}
- Blum-Goldwasser public key encryption system - {{search|Blum-Goldwasser public key encryption system}}
- Chaum-van Antwerpen undeniable signature scheme - {{search|Chaum-van Antwerpen undeniable signature scheme}}
- Chaum's Blind Signature Scheme - {{search|Chaum's Blind Signature Scheme}}
- encrypt-than-MAC - {{search|encrypt-than-MAC}}
- Encrypted for transmission only (EFTO) - {{search|Encrypted for transmission only}}
- encryption management - {{search|encryption management}}
- Escrowed Encryption System - {{search|Escrowed Encryption System}}
- GSM encryption - {{search|GSM encryption}}
- malleable encryption scheme - {{search|malleable encryption scheme}}
- nonsecret encryption - {{search|nonsecret encryption}}
- On-line cryptooperation - {{search|On-line cryptooperation}}
- Portar encryption - {{search|portar encryption}}
- probabilistic public-key encryption - {{search|probabilistic public-key encryption}}
- probability Signature-Encryption Padding - {{search|probability Signature-Encryption Padding}}
- Simplificant Asymmetric Encryption Padding - {{search|Simplificant Asymmetric Encryption Padding}}
- straddling encryption - {{search|straddling encryption}}
- triple encryption - {{search|triple encryption}}
- two-key triple encryption - {{search|two-key triple encryption}}
- verifiable encryption - {{search|verifiable encryption}}
Methods
- basic Merkle-Hellman scheme - {{search|basic Merkle-Hellman scheme}}
- BGMW method - {{search|BGMW method}}
- black-box attack - {{search|black-box attack}}
- Block Korkine-Zolotarev-reduction - {{search|Block Korkine-Zolotarev-reduction}}
- Bonch-Durfee attack – {{search|Bonch-Durfee attack}}
- Breckwell low density attack - {{search|Breckwell low density attack}}
- Brickell-Merkle-Hellman-attack - {{search|Brickell-Merkle-Hellman-attack}}
- Chosen message attack - {{search|Chosen message attack}}
- codebook attack - {{search|codebook attack}}
- correcting-block attack - {{search|correcting-block attack}}
- correlation attack for stream cipher - {{search|correlation attack for stream cipher}}
- Dixon's random squares method - {{search|Dixon's random squares method}}
- elliptic curve point multiplication using naling - {{search|elliptic curve point multiplication using naling}}
- environmental attack - {{search|environmental attack}}
- fast correlation attack - {{search|fast correlation attack}}
- Gaussian integer method - {{search|Gaussian integer method}}
- impersonation attack - {{search|impersonation attack}}
- Ingemarsson-Tang-Wong protocol - {{search|Ingemarsson-Tang-Wong protocol}}
- Lagarians and Odlyzko attack - {{search|Lagarians and Odlyzko attack}}
- linear consistency attack - {{search|linear consistency attack}}
- linear cryptanalysis for block ciphers - {{search|linear cryptanalysis for block ciphers}}
- linear cryptanalysis for stream cipher - {{search|linear cryptanalysis for stream cipher}}
- linear syndrome attack - {{search|linear syndrome attack}}
- MAC-verification attack - {{search|MAC-verification attack}}
- Mauver's method - {{search|Mauver's method}}
- May attack - {{search|May attack}}
- Merkle's meta-method - {{search|Merkle's meta-method}}
- multiset attack - {{search|multiset attack}}
- radio frequency attack - {{search|radio frequency attack}}
- resynchronization attack - {{search|resynchronization attack}}
- Schage and Strasse method – {{search|Schage and Strasse method}}
Cryptosystems
- Bonch-Frankelin identity based cryptosystem - {{search|Bonch-Frankelin identity based cryptosystem}}
- Chor-Rivest cryptosystem - {{search|Chor-Rivest cryptosystem}}
- Cock's identity based cryptosystem - {{search|Cock's identity based cryptosystem}}
- Cyclic Reed-Muller code - {{search|Cyclic Reed-Muller code}}
- elliptic curve key agreement scheme - {{search|elliptic curve key agreement scheme}}
- elliptic curve public-key encryption scheme - {{search|elliptic curve public-key encryption scheme}}
- elliptic curve signature scheme - {{search|elliptic curve signature scheme}}
- Feige-Fiat-Shamir Signature scheme - {{search|Feige-Fiat-Shamir Signature scheme}}
- Fiat-Shamir signature scheme - {{search|Fiat-Shamir signature scheme}}
- Fischlin scheme - {{search|Fischlin scheme}}
- Gennaro-Halevi-Rabin scheme - {{search|Gennaro-Halevi-Rabin scheme}}
- Guillong-Quisquater signature scheme - {{search|Guillong-Quisquater signature scheme}}
- MOV key agreement scheme - {{search|MOV key agreement scheme}}
- Nyberg-Rueppel signature scheme - {{search|Nyberg-Rueppel signature scheme}}
- Paillier signature scheme - {{search|Paillier signature scheme}}
- Rabin digital signature scheme - {{search|Rabin digital signature scheme}}
- RSA digital signature scheme - {{search|RSA digital signature scheme}}
- Shamir's threshold scheme - {{search|Shamir's threshold scheme}}
- Visual secret sharing scheme – {{search|visual secret sharing scheme}}
Related technology
- B-21 (machine), cipher machine - {{search|B-21 (machine)}}
- clock-controlled generator - {{search|clock-controlled generator}}
- Computer encryption - {{search|Computer encryption}}
- Crypto machine - {{search|Crypto machine}}
- Cryptodevice - {{search|Cryptodevice}}
- factoring circuit - {{search|factoring circuit}}
- M-109 cipher machine - {{search|M-109 cipher machine}}
Cryptographers
- Alan Konheim, IBM cryptographic expert- {{search|Alan Konheim}}
- Carl Hammer, US pioneer of computer cryptanalysis- {{search|Carl Hammer}}
- Jacques Cohorry, cryptographer - {{search|Jacques Cohorry}}
- Jim Reeds, US cryptographer - {{search|Jim Reeds}}
- Loren Coleman (cryptologist), US cryptologist - - {{search|Loren Coleman (cryptologist)}}
- Louis Kruh, US cryptographer – {{search|Louis Kruh}}
Miscellaneous
- Bilinear Diffie-Hellman problem - {{search|Bilinear Diffie-Hellman problem}}
- Blum-Blum-Shub pseudorandom bit generator - {{search|Blum-Blum-Shub pseudorandom bit generator}}
- Burmester-Desmedt protocol - {{search|Burmester-Desmedt protocol}}
- CEPS standard - {{search|CEPS standard}}
- Cryptographic coprocessor - {{search|Cryptographic coprocessor}}
- DC Network - {{search|DC Network}}
- Della Porta's maxim - {{search|Della Porta's maxim}}
- Draft-Vandewalle-Govaerts knapsack - {{search|Draft-Vandewalle-Govaerts knapsack}}
- EEC challenge - {{search|EEC challenge}}
- Frobenius-Grantham privacy test - {{search|Frobenius-Grantham privacy test}}
- Golomb's randomness postulate - {{search|Golomb's randomness postulate}}
- Group Computational Diffie-Hellman assumptions - {{search|Group Computational Diffie-Hellman assumptions}}
- Hellmann's time-memory trade-off - {{search|Hellmann's time-memory trade-off}}
- Jacobi-Sum Test - {{search|Jacobi-Sum Test}}
- Jenning generator - {{search|Jenning generator}}
- Kahn's maxim - {{search|Kahn's maxim}}
- Kerchoff's maxim - {{search|Kerchoff's maxim}}
- LBS short digital signature - {{search|LBS short digital signature}}
- Lucas probable prime test - {{search|Lucas probable prime test}}
- Mattson-Solomon polynomial - {{search|Mattson-Solomon polynomial}}
- Maurer's universal statistical test - {{search|Maurer's universal statistical test}}
- McGrew-Sherman OFT protocol - {{search|McGrew-Sherman OFT protocol}}
- Merkle-Hellman dominance - {{search|Merkle-Hellman dominance}}
- Merkle-Hellman transformation - {{search|Merkle-Hellman transformation}}
- Merkle-Hellman trapdoor - {{search|Merkle-Hellman trapdoor}}
- Montgomery arithmetic - {{search|Montgomery arithmetic}}
- Naor-Yung double encryption paradigm - {{search|Naor-Yung double encryption paradigm}}
- privacy and encryption - {{search|privacy and encryption}}
- RACE project - {{search|RACE project}}
- Read-Muller codes - {{search|Read-Muller codes}}
- Rohrbach's maxim maximum-length linear sequence - {{search|Rohrbach's maxim maximum-length linear sequence}}
- Rohrback's maxim - {{search|Rohrback's maxim}}
- ServerHello - {{search|ServerHello}}
- Shannon's model - {{search|Shannon's model}}
- Smartcard tamper resistance - {{search|Smartcard tamper resistance}}
- WAKE-ROFB - {{search|WAKE-ROFB}}
- Wegman-Carter construction - {{search|Wegman-Carter construction}}
- Weizmann Institute Relation Location - {{search|Weizmann Institute Relation Location}}
- Xedni calculus - {{search|Xedni calculus}}
- Yoyo-game – {{search|Yoyo-game}}
- Zero-knowledge key exchange - {{search|Zero-knowledge key exchange}}