User:Vivekreddy876/Books/crypto
Appearance
The Wikimedia Foundation's book rendering service has been withdrawn. Please upload your Wikipedia book to one of the external rendering services. |
You can still create and edit a book design using the Book Creator and upload it to an external rendering service:
|
This user book is a user-generated collection of Wikipedia articles that can be easily saved, rendered electronically, and ordered as a printed book. If you are the creator of this book and need help, see Help:Books (general tips) and WikiProject Wikipedia-Books (questions and assistance). Edit this book: Book Creator · Wikitext Order a printed copy from: PediaPress [ About ] [ Advanced ] [ FAQ ] [ Feedback ] [ Help ] [ WikiProject ] [ Recent Changes ] |
crypto
[edit]- Cryptography
- Outline of cryptography
- 6th Special Security Communications Team (United States)
- Accumulator (cryptography)
- Anonymous matching
- Array controller based encryption
- Backdoor (computing)
- Bcrypt
- Blacker (security)
- Blind credential
- Blinding (cryptography)
- BREACH (security exploit)
- Bus encryption
- Cipher
- Ciphertext
- Ciphertext expansion
- Civision
- Client-side encryption
- Code (cryptography)
- Code word
- Codebook
- Codress message
- Cohen's cryptosystem
- Communications security
- Comparison of cryptographic hash functions
- Completeness (cryptography)
- Computer security
- Concrete security
- Conjugate coding
- Convergent encryption
- Correlation immunity
- Cover (telecommunications)
- Cover-coding
- CRIME
- Critical Security Parameter
- Cryptanalysis
- Crypto-politics
- Cryptochannel
- Cryptographic engineering
- Cryptographic hash function
- Cryptographic Module Testing Laboratory
- Cryptographic nonce
- Cryptographic Service Provider
- CrypTool
- CryptoParty
- Cryptosystem
- Cryptovirology
- CrySyS Lab
- Cypherpunks: Freedom and the Future of the Internet
- Data at Rest
- Data in Use
- Database encryption
- Decipherment
- Deniable encryption
- Designated verifier signature
- Digital credential
- Digital signature forgery
- Dining cryptographers problem
- Diplomatic bag
- Direct Anonymous Attestation
- Discrete logarithm
- User:Dbabbitt/Sandbox/Draft Distributed Autonomous Organization Article
- EFF DES cracker
- Electronic signature
- Encrypted function
- Encryption
- End-to-end encryption
- Enigma machine
- Entropic security
- Ephemeral key
- Export of cryptography from the United States
- Factorization of polynomials over finite fields
- Feedback with Carry Shift Registers
- Floradora
- Forking lemma
- Forward anonymity
- Friend-to-friend
- Fully undetectable
- Functional encryption
- Generic group model
- Group key
- Hardware random number generator
- HashClash
- Honey Encryption
- Frederick Edward Hulme
- Hybrid cryptosystem
- Hyper-encryption
- Index of coincidence
- Information leakage
- Initialization vector
- Jötunvillur
- Kerckhoffs's principle
- Key (cryptography)
- Key Ceremony
- Key number method
- Keyring (cryptography)
- Kiss (cryptanalysis)
- Knapsack problem
- KY-7
- Lattice-based cryptography
- Learning with errors
- Length extension attack
- Letter frequency
- Malleability (cryptography)
- Master/Session
- MDS matrix
- Mean Shortest Distance
- Mental poker
- Mimic function
- Mix network
- Mulabhadra
- Multiple encryption
- Musical cryptogram
- Naor-Reingold Pseudorandom Function
- NIPRNet
- Noisy-storage model
- Normal basis
- Nothing up my sleeve number
- Off-line Root CA
- One-time pad
- One-way function
- Padding (cryptography)
- Passphrase
- Password Authenticated Key Exchange by Juggling
- Password psychology
- Password strength
- Password-based cryptography
- PGP word list
- Pizzino
- PKIoverheid
- Plaintext
- Polygraphic substitution
- PrivateCore
- Privilege Management Infrastructure
- Proof-of-stake
- Proof-of-work system
- Protocol composition logic
- Provable security
- Proxy re-encryption
- Pseudorandom ensemble
- Pseudorandom generator
- Quantum Byzantine agreement
- Quantum cryptography
- Quantum key distribution
- Randomness
- Red/black concept
- S/MIME
- Sacher hexachord
- Salt (cryptography)
- Schoenberg hexachord
- Scrambler
- Secure cryptoprocessor
- Secure Hash Algorithm
- Secure Hash Standard
- Secure voice
- Security association
- Security engineering
- Security parameter
- Security through obscurity
- Self-shrinking generator
- Server gated cryptography
- Server-based signatures
- SFINKS
- SIGINT Activity Designator
- Signals intelligence
- Signatures with efficient protocols
- SIPRNet
- Snake oil (cryptography)
- SnapTag
- Software token
- SPKAC
- Standard model (cryptography)
- Statistically close
- Strong cryptography
- Strong secrecy
- Subliminal channel
- Superincreasing sequence
- Symmetric Boolean function
- Tamper resistance
- Texas Instruments signing key controversy
- Thawte Crypto Challenge
- Tokenization (data security)
- Trace Zero Cryptography
- Transmission security
- Trapdoor function
- TRESOR
- Trusted Computing
- Trusted third party
- Two-way security
- Undeniable signature
- Unicity distance
- Unknown key-share attack
- Variably Modified Permutation Composition
- Verifiable secret sharing
- Visual cryptography
- Vocoder
- Voice inversion
- Vormetric
- Neil Leslie Webster
- WYSIWYS
- X.1035
- YAK (cryptography)
- Yao's test
- Portal:Cryptography
- BID/60
- BID 610
- Combined Cipher Machine
- Creed & Company
- Cryptex
- Crypto phone
- Cryptographic accelerator
- CYPRIS (microchip)
- Fialka
- Fish (cryptography)
- Hardware security module
- Hebern rotor machine
- Hengzhi chip
- IBM 4758
- IBM 4764
- KG-13
- Lacida
- Lorenz cipher
- Mercury (cipher machine)
- NEMA (machine)
- Noreen
- OMI cryptograph
- Pinwheel (cryptography)
- Plugboard
- Pockels effect
- Portex
- Rambutan (cryptography)
- Secure telephone
- Siemens and Halske T52
- SIGABA
- SIGCUM
- SSL acceleration
- Subscriber identity module
- Tamper-resistant security module
- Trusted Platform Module
- Typex