User:Vivekreddy876/Books/crypto

From Wikipedia, the free encyclopedia


crypto[edit]

Cryptography
Outline of cryptography
6th Special Security Communications Team (United States)
Accumulator (cryptography)
Anonymous matching
Array controller based encryption
Backdoor (computing)
Bcrypt
Blacker (security)
Blind credential
Blinding (cryptography)
BREACH (security exploit)
Bus encryption
Cipher
Ciphertext
Ciphertext expansion
Civision
Client-side encryption
Code (cryptography)
Code word
Codebook
Codress message
Cohen's cryptosystem
Communications security
Comparison of cryptographic hash functions
Completeness (cryptography)
Computer security
Concrete security
Conjugate coding
Convergent encryption
Correlation immunity
Cover (telecommunications)
Cover-coding
CRIME
Critical Security Parameter
Cryptanalysis
Crypto-politics
Cryptochannel
Cryptographic engineering
Cryptographic hash function
Cryptographic Module Testing Laboratory
Cryptographic nonce
Cryptographic Service Provider
CrypTool
CryptoParty
Cryptosystem
Cryptovirology
CrySyS Lab
Cypherpunks: Freedom and the Future of the Internet
Data at Rest
Data in Use
Database encryption
Decipherment
Deniable encryption
Designated verifier signature
Digital credential
Digital signature forgery
Dining cryptographers problem
Diplomatic bag
Direct Anonymous Attestation
Discrete logarithm
User:Dbabbitt/Sandbox/Draft Distributed Autonomous Organization Article
EFF DES cracker
Electronic signature
Encrypted function
Encryption
End-to-end encryption
Enigma machine
Entropic security
Ephemeral key
Export of cryptography from the United States
Factorization of polynomials over finite fields
Feedback with Carry Shift Registers
Floradora
Forking lemma
Forward anonymity
Friend-to-friend
Fully undetectable
Functional encryption
Generic group model
Group key
Hardware random number generator
HashClash
Honey Encryption
Frederick Edward Hulme
Hybrid cryptosystem
Hyper-encryption
Index of coincidence
Information leakage
Initialization vector
Jötunvillur
Kerckhoffs's principle
Key (cryptography)
Key Ceremony
Key number method
Keyring (cryptography)
Kiss (cryptanalysis)
Knapsack problem
KY-7
Lattice-based cryptography
Learning with errors
Length extension attack
Letter frequency
Malleability (cryptography)
Master/Session
MDS matrix
Mean Shortest Distance
Mental poker
Mimic function
Mix network
Mulabhadra
Multiple encryption
Musical cryptogram
Naor-Reingold Pseudorandom Function
NIPRNet
Noisy-storage model
Normal basis
Nothing up my sleeve number
Off-line Root CA
One-time pad
One-way function
Padding (cryptography)
Passphrase
Password Authenticated Key Exchange by Juggling
Password psychology
Password strength
Password-based cryptography
PGP word list
Pizzino
PKIoverheid
Plaintext
Polygraphic substitution
PrivateCore
Privilege Management Infrastructure
Proof-of-stake
Proof-of-work system
Protocol composition logic
Provable security
Proxy re-encryption
Pseudorandom ensemble
Pseudorandom generator
Quantum Byzantine agreement
Quantum cryptography
Quantum key distribution
Randomness
Red/black concept
S/MIME
Sacher hexachord
Salt (cryptography)
Schoenberg hexachord
Scrambler
Secure cryptoprocessor
Secure Hash Algorithm
Secure Hash Standard
Secure voice
Security association
Security engineering
Security parameter
Security through obscurity
Self-shrinking generator
Server gated cryptography
Server-based signatures
SFINKS
SIGINT Activity Designator
Signals intelligence
Signatures with efficient protocols
SIPRNet
Snake oil (cryptography)
SnapTag
Software token
SPKAC
Standard model (cryptography)
Statistically close
Strong cryptography
Strong secrecy
Subliminal channel
Superincreasing sequence
Symmetric Boolean function
Tamper resistance
Texas Instruments signing key controversy
Thawte Crypto Challenge
Tokenization (data security)
Trace Zero Cryptography
Transmission security
Trapdoor function
TRESOR
Trusted Computing
Trusted third party
Two-way security
Undeniable signature
Unicity distance
Unknown key-share attack
Variably Modified Permutation Composition
Verifiable secret sharing
Visual cryptography
Vocoder
Voice inversion
Vormetric
Neil Leslie Webster
WYSIWYS
X.1035
YAK (cryptography)
Yao's test
Portal:Cryptography
BID/60
BID 610
Combined Cipher Machine
Creed & Company
Cryptex
Crypto phone
Cryptographic accelerator
CYPRIS (microchip)
Fialka
Fish (cryptography)
Hardware security module
Hebern rotor machine
Hengzhi chip
IBM 4758
IBM 4764
KG-13
Lacida
Lorenz cipher
Mercury (cipher machine)
NEMA (machine)
Noreen
OMI cryptograph
Pinwheel (cryptography)
Plugboard
Pockels effect
Portex
Rambutan (cryptography)
Secure telephone
Siemens and Halske T52
SIGABA
SIGCUM
SSL acceleration
Subscriber identity module
Tamper-resistant security module
Trusted Platform Module
Typex