54:
21:
1356:
250:
200:
244:
405:
507:
38:
622:
517:
1029:
28:
1391:
806:
278:
1386:
1183:
868:
632:
1076:
935:
298:
1322:
739:
704:
542:
512:
1128:
612:
223:
1071:
754:
527:
427:
333:
1381:
957:
836:
764:
562:
360:
318:
1396:
853:
759:
652:
497:
385:
1401:
1376:
1312:
940:
729:
308:
734:
662:
637:
627:
447:
422:
185:
182:
179:
176:
173:
170:
167:
164:
161:
158:
155:
152:
149:
146:
143:
140:
137:
134:
131:
128:
125:
122:
119:
116:
113:
110:
105:
1302:
1178:
1148:
1034:
831:
577:
522:
492:
375:
1371:
1265:
1086:
1066:
769:
642:
355:
1235:
1158:
925:
724:
617:
607:
547:
467:
452:
261:
72:
8:
1143:
1091:
920:
395:
283:
1245:
1081:
1039:
952:
744:
587:
487:
400:
350:
345:
1133:
532:
303:
1138:
997:
987:
893:
888:
537:
293:
91:
1307:
1260:
1096:
915:
784:
774:
502:
227:
1327:
1292:
1118:
779:
328:
313:
60:
243:
The following 200 pages are in this category, out of approximately 343 total.
1365:
1297:
1240:
1198:
1173:
1123:
1054:
1049:
1044:
873:
816:
709:
597:
572:
457:
390:
288:
80:
1337:
1250:
977:
898:
677:
672:
567:
552:
64:
1342:
1277:
687:
647:
602:
1287:
1230:
1153:
858:
657:
380:
273:
1113:
878:
826:
821:
682:
100:
930:
1347:
1255:
1024:
1019:
1014:
1009:
883:
801:
692:
592:
432:
982:
962:
667:
582:
417:
370:
365:
53:
20:
1317:
1282:
1208:
1203:
1193:
1188:
848:
811:
749:
482:
462:
437:
1332:
1218:
1213:
1168:
1163:
1108:
992:
972:
967:
863:
719:
557:
477:
472:
323:
910:
714:
442:
796:
201:
Category:Cryptography articles needing expert attention
406:Brute Force: Cracking the Data Encryption Standard
212:This category has only the following subcategory.
1363:
93:
508:Commercial National Security Algorithm Suite
36:propose new stub templates and categories
245:This list may not reflect recent changes
69:To add an article to this category, use
623:Cryptographic Module Validation Program
518:Communication Theory of Secrecy Systems
1364:
240:Pages in category "Cryptography stubs"
207:
48:
15:
13:
1030:Initiative for Open Authentication
254:
214:
206:
67:. You can help by expanding them.
14:
1413:
807:Enrollment over Secure Transport
279:ABA digital signature guidelines
52:
19:
1184:Known-key distinguishing attack
869:Firefly (key exchange protocol)
26:This category is maintained by
1077:Java Cryptography Architecture
936:Group Domain of Interpretation
299:Acme Commodity and Phrase Code
1:
1323:MIME Object Security Services
740:Designated verifier signature
705:Data Authentication Algorithm
543:Controlled Cryptographic Item
513:Common reference string model
1129:Key signature (cryptography)
633:Cryptographie indéchiffrable
613:Cryptographic Message Syntax
238:
7:
1072:Japanese M-1 cipher machine
755:Differential fault analysis
528:Completeness (cryptography)
428:Card Verifiable Certificate
334:Authenticated Identity Body
194:
10:
1418:
958:Harvest now, decrypt later
837:Extendable-output function
765:Digital Signature Standard
563:Cover (telecommunications)
361:Bernstein v. United States
319:The American Black Chamber
854:Falcon (signature scheme)
760:Digital signature forgery
653:Cryptology ePrint Archive
498:Code word (communication)
1313:Messaging Layer Security
941:Group-based cryptography
730:Delegated Path Discovery
309:Adversary (cryptography)
29:WikiProject Stub sorting
1392:Computer security stubs
735:Deniable authentication
663:Cryptomenysis Patefacta
638:Cryptography newsgroups
628:Cryptographic Quarterly
448:Certification on demand
423:Capstone (cryptography)
1387:Computer science stubs
1303:Message authentication
1179:Knapsack cryptosystems
1149:Keyring (cryptography)
1035:Integral cryptanalysis
832:Export of cryptography
578:Cryptanalytic computer
523:Communications Machine
493:Client-side encryption
376:Bilateral key exchange
59:This category is for
1266:Lucky Thirteen attack
1087:Journal of Cryptology
1067:JADE (cipher machine)
770:Distribution ensemble
643:Cryptography Research
386:Blum–Micali algorithm
356:BEAR and LION ciphers
1236:Lane (hash function)
1159:Kiss (cryptanalysis)
926:GGH signature scheme
725:Decorrelation theory
618:Cryptographic module
608:Cryptographic log on
548:Correlation immunity
468:Ciphertext expansion
453:Chaos communications
262:Template:Crypto-stub
1144:Key-recovery attack
1092:JSON Web Encryption
921:Generic group model
396:Bricklayer function
284:ABC (stream cipher)
224:Cryptographer stubs
1246:LEVIATHAN (cipher)
1082:JH (hash function)
1040:Iraqi block cipher
953:HAIFA construction
745:Detached signature
588:Crypto API (Linux)
488:Client certificate
401:Audrey Ruth Briggs
351:Batch cryptography
346:Bar mitzvah attack
1382:Mathematics stubs
1355:(previous page) (
1134:Key signing party
533:Concrete security
304:Adiantum (cipher)
249:(previous page) (
89:
88:
47:
46:
1409:
1397:Technology stubs
1139:Key Transparency
998:Hyper-encryption
988:Horton principle
894:Full Domain Hash
889:Frogbit (cipher)
538:Conjugate coding
294:Access structure
229:
84:
76:
56:
49:
43:before creation.
23:
16:
1417:
1416:
1412:
1411:
1410:
1408:
1407:
1406:
1402:Espionage stubs
1377:Stub categories
1362:
1361:
1360:
1354:
1353:
1352:
1308:Message forgery
1270:
1261:Link encryption
1223:
1101:
1097:Junger v. Daley
1059:
1002:
945:
916:Geli (software)
903:
841:
789:
785:Dynamic secrets
775:Dragon (cipher)
697:
503:Codress message
410:
338:
266:
237:
236:
235:
234:
231:
230:
205:
197:
192:
191:
190:
96:
78:
70:
68:
33:
12:
11:
5:
1415:
1405:
1404:
1399:
1394:
1389:
1384:
1379:
1374:
1351:
1350:
1345:
1340:
1335:
1330:
1328:Mimic function
1325:
1320:
1315:
1310:
1305:
1300:
1295:
1293:Mercy (cipher)
1290:
1285:
1280:
1274:
1271:
1269:
1268:
1263:
1258:
1253:
1248:
1243:
1238:
1233:
1227:
1224:
1222:
1221:
1216:
1211:
1206:
1201:
1196:
1191:
1186:
1181:
1176:
1171:
1166:
1161:
1156:
1151:
1146:
1141:
1136:
1131:
1126:
1121:
1119:Key clustering
1116:
1111:
1105:
1102:
1100:
1099:
1094:
1089:
1084:
1079:
1074:
1069:
1063:
1060:
1058:
1057:
1052:
1047:
1042:
1037:
1032:
1027:
1022:
1017:
1012:
1006:
1003:
1001:
1000:
995:
990:
985:
980:
975:
970:
965:
960:
955:
949:
946:
944:
943:
938:
933:
928:
923:
918:
913:
907:
904:
902:
901:
896:
891:
886:
881:
876:
871:
866:
861:
856:
851:
845:
842:
840:
839:
834:
829:
824:
819:
814:
809:
804:
799:
793:
790:
788:
787:
782:
780:Dusting attack
777:
772:
767:
762:
757:
752:
747:
742:
737:
732:
727:
722:
717:
712:
707:
701:
698:
696:
695:
690:
685:
680:
675:
670:
665:
660:
655:
650:
645:
640:
635:
630:
625:
620:
615:
610:
605:
600:
595:
590:
585:
580:
575:
570:
565:
560:
555:
550:
545:
540:
535:
530:
525:
520:
515:
510:
505:
500:
495:
490:
485:
480:
475:
470:
465:
460:
455:
450:
445:
440:
435:
430:
425:
420:
414:
411:
409:
408:
403:
398:
393:
388:
383:
378:
373:
368:
363:
358:
353:
348:
342:
339:
337:
336:
331:
329:Ascon (cipher)
326:
321:
316:
314:Alternant code
311:
306:
301:
296:
291:
286:
281:
276:
270:
267:
265:
264:
258:
256:
255:
241:
233:
232:
222:
221:
218:
216:
215:
210:
204:
203:
196:
193:
189:
188:
108:
103:
97:
95:
92:
90:
87:
86:
57:
45:
44:
24:
9:
6:
4:
3:
2:
1414:
1403:
1400:
1398:
1395:
1393:
1390:
1388:
1385:
1383:
1380:
1378:
1375:
1373:
1370:
1369:
1367:
1358:
1349:
1346:
1344:
1341:
1339:
1336:
1334:
1331:
1329:
1326:
1324:
1321:
1319:
1316:
1314:
1311:
1309:
1306:
1304:
1301:
1299:
1298:MESH (cipher)
1296:
1294:
1291:
1289:
1286:
1284:
1281:
1279:
1276:
1275:
1272:
1267:
1264:
1262:
1259:
1257:
1254:
1252:
1249:
1247:
1244:
1242:
1241:Levchin Prize
1239:
1237:
1234:
1232:
1229:
1228:
1225:
1220:
1217:
1215:
1212:
1210:
1207:
1205:
1202:
1200:
1199:Kryptographik
1197:
1195:
1192:
1190:
1187:
1185:
1182:
1180:
1177:
1175:
1174:Kmc-Subset137
1172:
1170:
1167:
1165:
1162:
1160:
1157:
1155:
1152:
1150:
1147:
1145:
1142:
1140:
1137:
1135:
1132:
1130:
1127:
1125:
1124:Key generator
1122:
1120:
1117:
1115:
1112:
1110:
1107:
1106:
1103:
1098:
1095:
1093:
1090:
1088:
1085:
1083:
1080:
1078:
1075:
1073:
1070:
1068:
1065:
1064:
1061:
1056:
1055:ISO/IEC 19790
1053:
1051:
1050:ISO/IEC 18014
1048:
1046:
1045:ISO/IEC 10116
1043:
1041:
1038:
1036:
1033:
1031:
1028:
1026:
1023:
1021:
1018:
1016:
1013:
1011:
1008:
1007:
1004:
999:
996:
994:
991:
989:
986:
984:
981:
979:
976:
974:
971:
969:
966:
964:
961:
959:
956:
954:
951:
950:
947:
942:
939:
937:
934:
932:
929:
927:
924:
922:
919:
917:
914:
912:
909:
908:
905:
900:
897:
895:
892:
890:
887:
885:
882:
880:
877:
875:
874:FISH (cipher)
872:
870:
867:
865:
862:
860:
857:
855:
852:
850:
847:
846:
843:
838:
835:
833:
830:
828:
825:
823:
820:
818:
817:Ephemeral key
815:
813:
810:
808:
805:
803:
800:
798:
795:
794:
791:
786:
783:
781:
778:
776:
773:
771:
768:
766:
763:
761:
758:
756:
753:
751:
748:
746:
743:
741:
738:
736:
733:
731:
728:
726:
723:
721:
718:
716:
713:
711:
710:Davies attack
708:
706:
703:
702:
699:
694:
691:
689:
686:
684:
681:
679:
676:
674:
671:
669:
666:
664:
661:
659:
656:
654:
651:
649:
646:
644:
641:
639:
636:
634:
631:
629:
626:
624:
621:
619:
616:
614:
611:
609:
606:
604:
601:
599:
598:Crypto (book)
596:
594:
591:
589:
586:
584:
581:
579:
576:
574:
573:Crab (cipher)
571:
569:
566:
564:
561:
559:
556:
554:
551:
549:
546:
544:
541:
539:
536:
534:
531:
529:
526:
524:
521:
519:
516:
514:
511:
509:
506:
504:
501:
499:
496:
494:
491:
489:
486:
484:
481:
479:
476:
474:
471:
469:
466:
464:
461:
459:
458:Chaos machine
456:
454:
451:
449:
446:
444:
441:
439:
436:
434:
431:
429:
426:
424:
421:
419:
416:
415:
412:
407:
404:
402:
399:
397:
394:
392:
391:Branch number
389:
387:
384:
382:
379:
377:
374:
372:
369:
367:
364:
362:
359:
357:
354:
352:
349:
347:
344:
343:
340:
335:
332:
330:
327:
325:
322:
320:
317:
315:
312:
310:
307:
305:
302:
300:
297:
295:
292:
290:
289:Abhorchdienst
287:
285:
282:
280:
277:
275:
272:
271:
268:
263:
260:
259:
257:
252:
248:
246:
239:
225:
220:
219:
217:
213:
209:Subcategories
208:
202:
199:
198:
187:
184:
181:
178:
175:
172:
169:
166:
163:
160:
157:
154:
151:
148:
145:
142:
139:
136:
133:
130:
127:
124:
121:
118:
115:
112:
109:
107:
104:
102:
99:
98:
82:
74:
66:
62:
61:stub articles
58:
55:
51:
50:
42:
41:
40:
31:
30:
25:
22:
18:
17:
1372:Cryptography
1338:MMB (cipher)
1251:LEX (cipher)
978:Hengzhi chip
899:Full entropy
678:Cryptosystem
673:Cryptoperiod
568:Cover-coding
553:Coset leader
242:
211:
83:}}
79:{{
75:}}
71:{{
65:cryptography
63:relating to
37:
35:
27:
1343:Mod openpgp
1278:M6 (cipher)
688:Matt Curtin
648:Cryptologia
603:CryptoBuddy
77:instead of
73:crypto-stub
1366:Categories
1288:MDS matrix
1231:Ladder-DES
1154:Keysigning
859:FASCINATOR
658:Cryptoloop
381:Blockscale
274:A-1 (code)
1357:next page
1114:KCipher-2
879:Floradora
827:Even code
822:EuroCrypt
683:CS-Cipher
251:next page
94:Contents
1348:MOSQUITO
1256:LILI-128
1025:IDEA NXT
1020:IBM 4768
1015:IBM 4764
1010:IBM 4758
884:FORK-256
802:Enigmail
693:CWC mode
593:Crypto-1
433:CAST-256
195:See also
983:Hermes8
963:HAS-160
668:CRYPTON
583:CryptMT
418:CAPICOM
371:BID 610
366:BID 150
34:Please
1318:MICKEY
1283:Mcrypt
1209:KSV-21
1204:KSD-64
1194:KOV-21
1189:KOV-14
931:Grøstl
849:F-FCSR
812:EnRUPT
750:DICING
483:CLEFIA
463:CIKS-1
438:Ccrypt
228:(51 P)
1333:Mir-1
1219:KY-68
1214:KY-58
1169:KL-51
1164:KL-43
1109:KCDSA
993:HX-63
973:HAVAL
968:HAS-V
864:FEA-M
720:DECIM
558:COSIC
478:CJCSG
473:Ciphr
324:ANDVT
911:GBDE
715:DEAL
443:CDMF
81:stub
39:here
797:E4M
106:0–9
101:Top
1368::
1359:)
247:.
226:‎
1273:M
1226:L
1104:K
1062:J
1005:I
948:H
906:G
844:F
792:E
700:D
413:C
341:B
269:A
253:)
186:Z
183:Y
180:X
177:W
174:V
171:U
168:T
165:S
162:R
159:Q
156:P
153:O
150:N
147:M
144:L
141:K
138:J
135:I
132:H
129:G
126:F
123:E
120:D
117:C
114:B
111:A
85:.
32:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.