Knowledge

Category:Cryptography stubs

Source đź“ť

54: 21: 1356: 250: 200: 244: 405: 507: 38: 622: 517: 1029: 28: 1391: 806: 278: 1386: 1183: 868: 632: 1076: 935: 298: 1322: 739: 704: 542: 512: 1128: 612: 223: 1071: 754: 527: 427: 333: 1381: 957: 836: 764: 562: 360: 318: 1396: 853: 759: 652: 497: 385: 1401: 1376: 1312: 940: 729: 308: 734: 662: 637: 627: 447: 422: 185: 182: 179: 176: 173: 170: 167: 164: 161: 158: 155: 152: 149: 146: 143: 140: 137: 134: 131: 128: 125: 122: 119: 116: 113: 110: 105: 1302: 1178: 1148: 1034: 831: 577: 522: 492: 375: 1371: 1265: 1086: 1066: 769: 642: 355: 1235: 1158: 925: 724: 617: 607: 547: 467: 452: 261: 72: 8: 1143: 1091: 920: 395: 283: 1245: 1081: 1039: 952: 744: 587: 487: 400: 350: 345: 1133: 532: 303: 1138: 997: 987: 893: 888: 537: 293: 91: 1307: 1260: 1096: 915: 784: 774: 502: 227: 1327: 1292: 1118: 779: 328: 313: 60: 243:
The following 200 pages are in this category, out of approximately 343 total.
1365: 1297: 1240: 1198: 1173: 1123: 1054: 1049: 1044: 873: 816: 709: 597: 572: 457: 390: 288: 80: 1337: 1250: 977: 898: 677: 672: 567: 552: 64: 1342: 1277: 687: 647: 602: 1287: 1230: 1153: 858: 657: 380: 273: 1113: 878: 826: 821: 682: 100: 930: 1347: 1255: 1024: 1019: 1014: 1009: 883: 801: 692: 592: 432: 982: 962: 667: 582: 417: 370: 365: 53: 20: 1317: 1282: 1208: 1203: 1193: 1188: 848: 811: 749: 482: 462: 437: 1332: 1218: 1213: 1168: 1163: 1108: 992: 972: 967: 863: 719: 557: 477: 472: 323: 910: 714: 442: 796: 201:
Category:Cryptography articles needing expert attention
406:Brute Force: Cracking the Data Encryption Standard 212:This category has only the following subcategory. 1363: 93: 508:Commercial National Security Algorithm Suite 36:propose new stub templates and categories 245:This list may not reflect recent changes 69:To add an article to this category, use 623:Cryptographic Module Validation Program 518:Communication Theory of Secrecy Systems 1364: 240:Pages in category "Cryptography stubs" 207: 48: 15: 13: 1030:Initiative for Open Authentication 254: 214: 206: 67:. You can help by expanding them. 14: 1413: 807:Enrollment over Secure Transport 279:ABA digital signature guidelines 52: 19: 1184:Known-key distinguishing attack 869:Firefly (key exchange protocol) 26:This category is maintained by 1077:Java Cryptography Architecture 936:Group Domain of Interpretation 299:Acme Commodity and Phrase Code 1: 1323:MIME Object Security Services 740:Designated verifier signature 705:Data Authentication Algorithm 543:Controlled Cryptographic Item 513:Common reference string model 1129:Key signature (cryptography) 633:Cryptographie indéchiffrable 613:Cryptographic Message Syntax 238: 7: 1072:Japanese M-1 cipher machine 755:Differential fault analysis 528:Completeness (cryptography) 428:Card Verifiable Certificate 334:Authenticated Identity Body 194: 10: 1418: 958:Harvest now, decrypt later 837:Extendable-output function 765:Digital Signature Standard 563:Cover (telecommunications) 361:Bernstein v. United States 319:The American Black Chamber 854:Falcon (signature scheme) 760:Digital signature forgery 653:Cryptology ePrint Archive 498:Code word (communication) 1313:Messaging Layer Security 941:Group-based cryptography 730:Delegated Path Discovery 309:Adversary (cryptography) 29:WikiProject Stub sorting 1392:Computer security stubs 735:Deniable authentication 663:Cryptomenysis Patefacta 638:Cryptography newsgroups 628:Cryptographic Quarterly 448:Certification on demand 423:Capstone (cryptography) 1387:Computer science stubs 1303:Message authentication 1179:Knapsack cryptosystems 1149:Keyring (cryptography) 1035:Integral cryptanalysis 832:Export of cryptography 578:Cryptanalytic computer 523:Communications Machine 493:Client-side encryption 376:Bilateral key exchange 59:This category is for 1266:Lucky Thirteen attack 1087:Journal of Cryptology 1067:JADE (cipher machine) 770:Distribution ensemble 643:Cryptography Research 386:Blum–Micali algorithm 356:BEAR and LION ciphers 1236:Lane (hash function) 1159:Kiss (cryptanalysis) 926:GGH signature scheme 725:Decorrelation theory 618:Cryptographic module 608:Cryptographic log on 548:Correlation immunity 468:Ciphertext expansion 453:Chaos communications 262:Template:Crypto-stub 1144:Key-recovery attack 1092:JSON Web Encryption 921:Generic group model 396:Bricklayer function 284:ABC (stream cipher) 224:Cryptographer stubs 1246:LEVIATHAN (cipher) 1082:JH (hash function) 1040:Iraqi block cipher 953:HAIFA construction 745:Detached signature 588:Crypto API (Linux) 488:Client certificate 401:Audrey Ruth Briggs 351:Batch cryptography 346:Bar mitzvah attack 1382:Mathematics stubs 1355:(previous page) ( 1134:Key signing party 533:Concrete security 304:Adiantum (cipher) 249:(previous page) ( 89: 88: 47: 46: 1409: 1397:Technology stubs 1139:Key Transparency 998:Hyper-encryption 988:Horton principle 894:Full Domain Hash 889:Frogbit (cipher) 538:Conjugate coding 294:Access structure 229: 84: 76: 56: 49: 43:before creation. 23: 16: 1417: 1416: 1412: 1411: 1410: 1408: 1407: 1406: 1402:Espionage stubs 1377:Stub categories 1362: 1361: 1360: 1354: 1353: 1352: 1308:Message forgery 1270: 1261:Link encryption 1223: 1101: 1097:Junger v. Daley 1059: 1002: 945: 916:Geli (software) 903: 841: 789: 785:Dynamic secrets 775:Dragon (cipher) 697: 503:Codress message 410: 338: 266: 237: 236: 235: 234: 231: 230: 205: 197: 192: 191: 190: 96: 78: 70: 68: 33: 12: 11: 5: 1415: 1405: 1404: 1399: 1394: 1389: 1384: 1379: 1374: 1351: 1350: 1345: 1340: 1335: 1330: 1328:Mimic function 1325: 1320: 1315: 1310: 1305: 1300: 1295: 1293:Mercy (cipher) 1290: 1285: 1280: 1274: 1271: 1269: 1268: 1263: 1258: 1253: 1248: 1243: 1238: 1233: 1227: 1224: 1222: 1221: 1216: 1211: 1206: 1201: 1196: 1191: 1186: 1181: 1176: 1171: 1166: 1161: 1156: 1151: 1146: 1141: 1136: 1131: 1126: 1121: 1119:Key clustering 1116: 1111: 1105: 1102: 1100: 1099: 1094: 1089: 1084: 1079: 1074: 1069: 1063: 1060: 1058: 1057: 1052: 1047: 1042: 1037: 1032: 1027: 1022: 1017: 1012: 1006: 1003: 1001: 1000: 995: 990: 985: 980: 975: 970: 965: 960: 955: 949: 946: 944: 943: 938: 933: 928: 923: 918: 913: 907: 904: 902: 901: 896: 891: 886: 881: 876: 871: 866: 861: 856: 851: 845: 842: 840: 839: 834: 829: 824: 819: 814: 809: 804: 799: 793: 790: 788: 787: 782: 780:Dusting attack 777: 772: 767: 762: 757: 752: 747: 742: 737: 732: 727: 722: 717: 712: 707: 701: 698: 696: 695: 690: 685: 680: 675: 670: 665: 660: 655: 650: 645: 640: 635: 630: 625: 620: 615: 610: 605: 600: 595: 590: 585: 580: 575: 570: 565: 560: 555: 550: 545: 540: 535: 530: 525: 520: 515: 510: 505: 500: 495: 490: 485: 480: 475: 470: 465: 460: 455: 450: 445: 440: 435: 430: 425: 420: 414: 411: 409: 408: 403: 398: 393: 388: 383: 378: 373: 368: 363: 358: 353: 348: 342: 339: 337: 336: 331: 329:Ascon (cipher) 326: 321: 316: 314:Alternant code 311: 306: 301: 296: 291: 286: 281: 276: 270: 267: 265: 264: 258: 256: 255: 241: 233: 232: 222: 221: 218: 216: 215: 210: 204: 203: 196: 193: 189: 188: 108: 103: 97: 95: 92: 90: 87: 86: 57: 45: 44: 24: 9: 6: 4: 3: 2: 1414: 1403: 1400: 1398: 1395: 1393: 1390: 1388: 1385: 1383: 1380: 1378: 1375: 1373: 1370: 1369: 1367: 1358: 1349: 1346: 1344: 1341: 1339: 1336: 1334: 1331: 1329: 1326: 1324: 1321: 1319: 1316: 1314: 1311: 1309: 1306: 1304: 1301: 1299: 1298:MESH (cipher) 1296: 1294: 1291: 1289: 1286: 1284: 1281: 1279: 1276: 1275: 1272: 1267: 1264: 1262: 1259: 1257: 1254: 1252: 1249: 1247: 1244: 1242: 1241:Levchin Prize 1239: 1237: 1234: 1232: 1229: 1228: 1225: 1220: 1217: 1215: 1212: 1210: 1207: 1205: 1202: 1200: 1199:Kryptographik 1197: 1195: 1192: 1190: 1187: 1185: 1182: 1180: 1177: 1175: 1174:Kmc-Subset137 1172: 1170: 1167: 1165: 1162: 1160: 1157: 1155: 1152: 1150: 1147: 1145: 1142: 1140: 1137: 1135: 1132: 1130: 1127: 1125: 1124:Key generator 1122: 1120: 1117: 1115: 1112: 1110: 1107: 1106: 1103: 1098: 1095: 1093: 1090: 1088: 1085: 1083: 1080: 1078: 1075: 1073: 1070: 1068: 1065: 1064: 1061: 1056: 1055:ISO/IEC 19790 1053: 1051: 1050:ISO/IEC 18014 1048: 1046: 1045:ISO/IEC 10116 1043: 1041: 1038: 1036: 1033: 1031: 1028: 1026: 1023: 1021: 1018: 1016: 1013: 1011: 1008: 1007: 1004: 999: 996: 994: 991: 989: 986: 984: 981: 979: 976: 974: 971: 969: 966: 964: 961: 959: 956: 954: 951: 950: 947: 942: 939: 937: 934: 932: 929: 927: 924: 922: 919: 917: 914: 912: 909: 908: 905: 900: 897: 895: 892: 890: 887: 885: 882: 880: 877: 875: 874:FISH (cipher) 872: 870: 867: 865: 862: 860: 857: 855: 852: 850: 847: 846: 843: 838: 835: 833: 830: 828: 825: 823: 820: 818: 817:Ephemeral key 815: 813: 810: 808: 805: 803: 800: 798: 795: 794: 791: 786: 783: 781: 778: 776: 773: 771: 768: 766: 763: 761: 758: 756: 753: 751: 748: 746: 743: 741: 738: 736: 733: 731: 728: 726: 723: 721: 718: 716: 713: 711: 710:Davies attack 708: 706: 703: 702: 699: 694: 691: 689: 686: 684: 681: 679: 676: 674: 671: 669: 666: 664: 661: 659: 656: 654: 651: 649: 646: 644: 641: 639: 636: 634: 631: 629: 626: 624: 621: 619: 616: 614: 611: 609: 606: 604: 601: 599: 598:Crypto (book) 596: 594: 591: 589: 586: 584: 581: 579: 576: 574: 573:Crab (cipher) 571: 569: 566: 564: 561: 559: 556: 554: 551: 549: 546: 544: 541: 539: 536: 534: 531: 529: 526: 524: 521: 519: 516: 514: 511: 509: 506: 504: 501: 499: 496: 494: 491: 489: 486: 484: 481: 479: 476: 474: 471: 469: 466: 464: 461: 459: 458:Chaos machine 456: 454: 451: 449: 446: 444: 441: 439: 436: 434: 431: 429: 426: 424: 421: 419: 416: 415: 412: 407: 404: 402: 399: 397: 394: 392: 391:Branch number 389: 387: 384: 382: 379: 377: 374: 372: 369: 367: 364: 362: 359: 357: 354: 352: 349: 347: 344: 343: 340: 335: 332: 330: 327: 325: 322: 320: 317: 315: 312: 310: 307: 305: 302: 300: 297: 295: 292: 290: 289:Abhorchdienst 287: 285: 282: 280: 277: 275: 272: 271: 268: 263: 260: 259: 257: 252: 248: 246: 239: 225: 220: 219: 217: 213: 209:Subcategories 208: 202: 199: 198: 187: 184: 181: 178: 175: 172: 169: 166: 163: 160: 157: 154: 151: 148: 145: 142: 139: 136: 133: 130: 127: 124: 121: 118: 115: 112: 109: 107: 104: 102: 99: 98: 82: 74: 66: 62: 61:stub articles 58: 55: 51: 50: 42: 41: 40: 31: 30: 25: 22: 18: 17: 1372:Cryptography 1338:MMB (cipher) 1251:LEX (cipher) 978:Hengzhi chip 899:Full entropy 678:Cryptosystem 673:Cryptoperiod 568:Cover-coding 553:Coset leader 242: 211: 83:}} 79:{{ 75:}} 71:{{ 65:cryptography 63:relating to 37: 35: 27: 1343:Mod openpgp 1278:M6 (cipher) 688:Matt Curtin 648:Cryptologia 603:CryptoBuddy 77:instead of 73:crypto-stub 1366:Categories 1288:MDS matrix 1231:Ladder-DES 1154:Keysigning 859:FASCINATOR 658:Cryptoloop 381:Blockscale 274:A-1 (code) 1357:next page 1114:KCipher-2 879:Floradora 827:Even code 822:EuroCrypt 683:CS-Cipher 251:next page 94:Contents 1348:MOSQUITO 1256:LILI-128 1025:IDEA NXT 1020:IBM 4768 1015:IBM 4764 1010:IBM 4758 884:FORK-256 802:Enigmail 693:CWC mode 593:Crypto-1 433:CAST-256 195:See also 983:Hermes8 963:HAS-160 668:CRYPTON 583:CryptMT 418:CAPICOM 371:BID 610 366:BID 150 34:Please 1318:MICKEY 1283:Mcrypt 1209:KSV-21 1204:KSD-64 1194:KOV-21 1189:KOV-14 931:Grøstl 849:F-FCSR 812:EnRUPT 750:DICING 483:CLEFIA 463:CIKS-1 438:Ccrypt 228:(51 P) 1333:Mir-1 1219:KY-68 1214:KY-58 1169:KL-51 1164:KL-43 1109:KCDSA 993:HX-63 973:HAVAL 968:HAS-V 864:FEA-M 720:DECIM 558:COSIC 478:CJCSG 473:Ciphr 324:ANDVT 911:GBDE 715:DEAL 443:CDMF 81:stub 39:here 797:E4M 106:0–9 101:Top 1368:: 1359:) 247:. 226:‎ 1273:M 1226:L 1104:K 1062:J 1005:I 948:H 906:G 844:F 792:E 700:D 413:C 341:B 269:A 253:) 186:Z 183:Y 180:X 177:W 174:V 171:U 168:T 165:S 162:R 159:Q 156:P 153:O 150:N 147:M 144:L 141:K 138:J 135:I 132:H 129:G 126:F 123:E 120:D 117:C 114:B 111:A 85:. 32:.

Index


WikiProject Stub sorting
here

stub articles
cryptography
crypto-stub
stub
Top
0–9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑