Jump to content

Wikipedia:WikiProject Cryptography/Popular pages

From Wikipedia, the free encyclopedia

This is a list of pages in the scope of Wikipedia:WikiProject Cryptography along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

List

[edit]

Period: 2024-07-01 to 2024-07-31

Total views: 5,686,173

Updated: 01:01, 6 August 2024 (UTC)

Rank Page title Views Daily average Assessment Importance
1 WhatsApp 715,607 23,084 B High
2 Telegram (software) 407,808 13,155 B Mid
3 Alan Turing 149,060 4,808 GA Top
4 Bitcoin 148,026 4,775 B High
5 WikiLeaks 139,905 4,513 B Low
6 Tor (network) 91,316 2,945 B Mid
7 Cryptocurrency 86,291 2,783 C High
8 Voynich manuscript 70,090 2,260 B Low
9 Transport Layer Security 67,763 2,185 B Top
10 The Imitation Game 66,705 2,151 C Mid
11 Blockchain 60,933 1,965 B High
12 National Security Agency 60,887 1,964 C High
13 HTTPS 53,591 1,728 C High
14 Virtual private network 46,111 1,487 C Mid
15 History of bitcoin 45,545 1,469 C Low
16 RSA (cryptosystem) 44,812 1,445 C Top
17 Diffie–Hellman key exchange 44,780 1,444 C Top
18 Enigma machine 44,582 1,438 C High
19 Advanced Encryption Standard 41,606 1,342 B Top
20 HTTP Strict Transport Security 41,140 1,327 C Low
21 Darknet market 40,646 1,311 B Mid
22 Signal (messaging app) 38,055 1,227 C Mid
23 Secure Shell 37,426 1,207 C High
24 SHA-2 35,399 1,141 C Top
25 Cryptography 35,000 1,129 C Top
26 Dogecoin 31,739 1,023 C Low
27 Public-key cryptography 31,213 1,006 C Top
28 MD5 31,019 1,000 C Top
29 Vitalik Buterin 29,550 953 C Low
30 Block cipher mode of operation 28,232 910 C Top
31 Caesar cipher 27,127 875 FA High
32 Changpeng Zhao 26,714 861 Start Low
33 Man-in-the-middle attack 26,343 849 C Mid
34 Keychain (software) 25,919 836 Start Unknown
35 Active Directory 25,755 830 C Low
36 Vigenère cipher 25,102 809 B Low
37 Digital signature 25,058 808 C Top
38 HMAC 24,890 802 C High
39 Steganography 23,987 773 B High
40 GCHQ 23,440 756 B Low
41 Information theory 23,306 751 B Top
42 Cryptographic hash function 22,268 718 C Top
43 Joan Clarke 22,027 710 C Mid
44 Proton Mail 22,006 709 C Low
45 Claude Shannon 21,932 707 C Top
46 Vault 7 21,334 688 C Mid
47 Password 21,013 677 C Top
48 NordVPN 20,951 675 C Mid
49 SHA-1 20,848 672 C Top
50 Zimmermann Telegram 20,742 669 B High
51 Sator Square 20,453 659 B Low
52 Certificate authority 19,580 631 C High
53 Zero-knowledge proof 19,438 627 C Top
54 Trusted Platform Module 19,400 625 C Mid
55 Kryptos 19,329 623 C Low
56 Pretty Good Privacy 19,191 619 B High
57 Knapsack problem 18,849 608 C Mid
58 Bletchley Park 17,890 577 B High
59 Encryption 17,855 575 C Top
60 Cipher 17,759 572 C Top
61 Information security 17,738 572 B Top
62 Rainbow table 17,615 568 C High
63 Wi-Fi Protected Access 17,168 553 C Mid
64 Elliptic-curve cryptography 17,001 548 C High
65 Post-quantum cryptography 16,835 543 C High
66 Merkle tree 16,700 538 C Mid
67 Letter frequency 16,589 535 B Low
68 One-time password 16,162 521 C Mid
69 Kerberos (protocol) 15,299 493 C High
70 One-time pad 15,263 492 C Top
71 ROT13 15,242 491 C Mid
72 Public key certificate 14,880 480 C Top
73 Digital rights management 14,767 476 B High
74 Public key infrastructure 14,728 475 C Top
75 Homomorphic encryption 13,741 443 C High
76 OpenVPN 13,636 439 C Mid
77 Apple–FBI encryption dispute 13,329 429 C Low
78 Phone hacking 13,226 426 Start Mid
79 .onion 13,096 422 C Low
80 Elliptic Curve Digital Signature Algorithm 13,083 422 C High
81 Bcrypt 12,991 419 C Mid
82 Code talker 12,967 418 B Low
83 SSH File Transfer Protocol 12,871 415 Start Unknown
84 Salt (cryptography) 12,834 414 Start High
85 Cryptanalysis of the Enigma 12,693 409 C Mid
86 Secure Hash Algorithms 12,397 399 Start High
87 OpenSSL 11,607 374 B High
88 Galois/Counter Mode 11,575 373 C Mid
89 SHA-3 11,475 370 Start Mid
90 Bitcoin Cash 11,091 357 Start Low
91 Differential privacy 10,963 353 C Mid
92 Brute-force attack 10,758 347 C High
93 Shiba Inu (cryptocurrency) 10,625 342 Start Low
94 Authentication 10,575 341 C High
95 Symmetric-key algorithm 10,296 332 Start Top
96 OpenSSH 10,291 331 C High
97 Substitution cipher 10,231 330 Unknown Unknown
98 Tails (operating system) 10,181 328 Start Low
99 Data Encryption Standard 10,157 327 C Top
100 Link 16 10,060 324 Start Low
101 Grover's algorithm 9,962 321 C Mid
102 Integer factorization 9,947 320 B Mid
103 Comparison of BitTorrent clients 9,942 320 List Low
104 Bombe 9,861 318 B Mid
105 InterPlanetary File System 9,826 316 C Low
106 PBKDF2 9,679 312 C Low
107 Cryptonomicon 9,662 311 C Low
108 Alice and Bob 9,568 308 Start Low
109 Pay television 9,535 307 Start Unknown
110 The Tor Project 9,511 306 C Mid
111 Mullvad 9,435 304 Start Low
112 Shamir's secret sharing 9,316 300 C High
113 Forward secrecy 9,173 295 C High
114 Fort Meade 9,145 295 C Low
115 Theoretical computer science 9,139 294 B Low
116 I2P 9,109 293 B Low
117 Cryptographic nonce 8,801 283 Start High
118 Authenticated encryption 8,774 283 C Mid
119 Ultra (cryptography) 8,443 272 C High
120 3-D Secure 8,397 270 Start Low
121 Beale ciphers 8,342 269 B Low
122 Quantum key distribution 8,301 267 B Mid
123 EdDSA 8,218 265 C High
124 Colossus computer 8,206 264 B Mid
125 Cypherpunk 8,203 264 C Mid
126 VeraCrypt 8,199 264 C Mid
127 ChaCha20-Poly1305 8,195 264 C Low
128 Bitwarden 8,027 258 C Low
129 Babington Plot 7,927 255 C Low
130 Password cracking 7,880 254 C Mid
131 Message authentication code 7,561 243 C Top
132 Password manager 7,552 243 C Low
133 Cipher suite 7,485 241 C Top
134 Elliptic-curve Diffie–Hellman 7,407 238 Start Mid
135 Curve25519 7,390 238 C High
136 Cryptographically secure pseudorandom number generator 7,361 237 C Top
137 Password strength 7,333 236 C High
138 Certificate signing request 7,270 234 C Low
139 Cryptanalysis 7,264 234 C High
140 Proof of stake 7,249 233 Start Low
141 Side-channel attack 7,038 227 C High
142 Argon2 7,036 226 C Mid
143 PKCS 12 7,031 226 Start Unknown
144 FIPS 140-2 6,983 225 C Mid
145 Digest access authentication 6,772 218 B Low
146 Birthday attack 6,745 217 C High
147 Self-signed certificate 6,718 216 Start Unknown
148 Salsa20 6,709 216 C Top
149 Blockchain game 6,691 215 Start Low
150 KeePass 6,588 212 C Low
151 Triple DES 6,557 211 Start Unknown
152 Directory service 6,552 211 Start Mid
153 Quantum cryptography 6,438 207 C High
154 Decentralized finance 6,387 206 Start Low
155 Key derivation function 6,368 205 C Low
156 Block cipher 6,321 203 C Top
157 Qubes OS 6,309 203 C Mid
158 Cryptocurrency tumbler 6,309 203 Start Unknown
159 RSA Security 6,264 202 C Unknown
160 IMSI-catcher 6,249 201 Start Mid
161 Digital Signature Algorithm 6,244 201 C Top
162 Matrix (protocol) 6,236 201 Start Unknown
163 RC4 6,193 199 B Top
164 Hyphanet 6,186 199 B Mid
165 Discrete logarithm 6,173 199 C Mid
166 Illegal number 6,079 196 C Low
167 Playfair cipher 6,068 195 Unknown Unknown
168 Utah Data Center 6,017 194 C Mid
169 GNU Privacy Guard 5,970 192 C Unknown
170 Litecoin 5,903 190 Start Low
171 Bitconnect 5,883 189 C Low
172 Secure multi-party computation 5,869 189 Start High
173 Mutual authentication 5,840 188 Stub Low
174 Units of information 5,816 187 C Unknown
175 Datagram Transport Layer Security 5,802 187 Start Mid
176 Citizenfour 5,791 186 C Low
177 11B-X-1371 5,786 186 GA Low
178 Tap code 5,743 185 Start Low
179 Root certificate 5,732 184 Start Low
180 Bitcoin Core 5,624 181 Start Low
181 Confidentiality 5,544 178 C Low
182 Certificate revocation list 5,517 177 C Low
183 Signal Protocol 5,407 174 C High
184 Kerckhoffs's principle 5,371 173 Start Mid
185 Automatic Certificate Management Environment 5,306 171 Start Low
186 Dual EC DRBG 5,284 170 C High
187 Wired Equivalent Privacy 5,247 169 C Mid
188 Adi Shamir 5,200 167 Start Unknown
189 Supply chain attack 5,171 166 C Low
190 Key (cryptography) 5,088 164 Start Unknown
191 KeePassXC 5,086 164 Start Low
192 Entrust 5,079 163 Start Low
193 Electronic signature 5,012 161 C Low
194 Deniable encryption 4,972 160 Start High
195 Cryptogram 4,967 160 C Mid
196 Lavarand 4,967 160 Start Mid
197 Initialization vector 4,877 157 C High
198 Lorenz cipher 4,865 156 C Top
199 Rijndael S-box 4,856 156 Start Low
200 Lattice-based cryptography 4,803 154 Start Low
201 BLAKE (hash function) 4,796 154 C Mid
202 Richard Teng 4,785 154 Start Low
203 Padding (cryptography) 4,747 153 Start Unknown
204 Transposition cipher 4,701 151 Unknown Unknown
205 Blowfish (cipher) 4,669 150 B High
206 RSA SecurID 4,562 147 Unknown Unknown
207 Privacy-Enhanced Mail 4,498 145 Start Low
208 Conel Hugh O'Donel Alexander 4,460 143 Start Low
209 Stream cipher 4,434 143 Start Top
210 Harvest now, decrypt later 4,395 141 Start Low
211 Replay attack 4,342 140 C Top
212 Len Sassaman 4,339 139 Start Unknown
213 AES instruction set 4,309 139 C Low
214 Commitment scheme 4,299 138 C High
215 Gordon Welchman 4,287 138 C Low
216 Boolean function 4,282 138 Start Mid
217 XOR cipher 4,276 137 Stub Mid
218 Polkadot (cryptocurrency) 4,246 136 Start Low
219 Bruce Schneier 4,224 136 Start High
220 PKCS 4,206 135 List High
221 TrueCrypt 4,198 135 C Mid
222 DNS-based Authentication of Named Entities 4,170 134 C Mid
223 Fork (blockchain) 4,131 133 Start Mid
224 ElGamal encryption 4,106 132 Start Top
225 Challenge–response authentication 4,036 130 Start Mid
226 The Doughnut 4,019 129 GA High
227 Cold boot attack 3,951 127 C Low
228 Web of trust 3,924 126 C High
229 NIST Post-Quantum Cryptography Standardization 3,907 126 C Mid
230 Ciphertext 3,880 125 Start High
231 One-way function 3,834 123 Start Top
232 History of cryptography 3,821 123 Start High
233 Non-repudiation 3,814 123 Start Mid
234 Disk encryption 3,774 121 C High
235 Key size 3,740 120 C High
236 Polybius square 3,709 119 Start Mid
237 Crypto AG 3,707 119 C High
238 Cryptographic protocol 3,706 119 Start High
239 Communications Security Establishment 3,694 119 C Mid
240 Special Collection Service 3,683 118 C Low
241 Marian Rejewski 3,680 118 FA Mid
242 Diplomatic bag 3,642 117 Start Low
243 Frequency analysis 3,631 117 C High
244 Ricky McCormick's encrypted notes 3,592 115 B Low
245 Criticism of Dropbox 3,576 115 B Low
246 WebTorrent 3,525 113 Start Unknown
247 PKCS 11 3,509 113 Unknown Unknown
248 PKCS 7 3,502 112 Start Low
249 Pepper (cryptography) 3,498 112 Start Low
250 Session (software) 3,478 112 Start Low
251 Digital watermarking 3,452 111 B Mid
252 Rail fence cipher 3,381 109 Start Low
253 SipHash 3,375 108 Start Low
254 Bitcoin scalability problem 3,365 108 C Low
255 K-anonymity 3,353 108 Start Mid
256 AES key schedule 3,340 107 Start Low
257 William Binney (intelligence official) 3,338 107 Start Mid
258 Disk encryption theory 3,332 107 C Unknown
259 Subject Alternative Name 3,311 106 Stub Mid
260 Plaintext 3,294 106 Start High
261 Atbash 3,278 105 Stub Low
262 Padding oracle attack 3,262 105 Stub Unknown
263 Book cipher 3,258 105 C Low
264 List of ciphertexts 3,212 103 List Low
265 Australian Signals Directorate 3,178 102 C Low
266 Comparison of SSH clients 3,157 101 List Low
267 Phil Zimmermann 3,143 101 Start Mid
268 Adam Back 3,136 101 Start Low
269 Bacon's cipher 3,130 100 Start Low
270 Daniel J. Bernstein 3,102 100 C Mid
271 Crypto-anarchy 3,088 99 Start High
272 Key disclosure law 3,085 99 C Low
273 Threema 3,078 99 C Unknown
274 Whonix 3,076 99 Start Mid
275 PKCS 1 3,070 99 C Mid
276 Trusted timestamping 3,060 98 Start Unknown
277 David Chaum 3,048 98 C Low
278 Bomba (cryptography) 3,028 97 Start Low
279 Timing attack 2,989 96 C High
280 Non-interactive zero-knowledge proof 2,973 95 Start Low
281 Avalanche effect 2,966 95 Start High
282 Code signing 2,961 95 C Low
283 Elizebeth Smith Friedman 2,943 94 C Mid
284 PKCS 8 2,910 93 Stub Unknown
285 Feistel cipher 2,905 93 Start Unknown
286 Certificate Transparency 2,900 93 C High
287 Polyalphabetic cipher 2,896 93 Start Unknown
288 Reception and criticism of WhatsApp security and privacy features 2,865 92 C Low
289 Type B Cipher Machine 2,860 92 Start Low
290 Known-plaintext attack 2,857 92 Start High
291 Collision attack 2,849 91 Start High
292 Authenticator 2,820 90 Start Unknown
293 Key exchange 2,813 90 Start Unknown
294 Elliptic curve point multiplication 2,806 90 C Mid
295 Data at rest 2,783 89 C Mid
296 Dictionary attack 2,761 89 C Unknown
297 Encrypting File System 2,729 88 B Unknown
298 Preimage attack 2,727 87 Stub Unknown
299 Quantum network 2,722 87 C Low
300 Communications security 2,718 87 Start Mid
301 Whitfield Diffie 2,698 87 B High
302 Length extension attack 2,691 86 Start Unknown
303 Merkle–Damgård construction 2,686 86 C Unknown
304 Pre-shared key 2,674 86 Start Mid
305 HTTP Public Key Pinning 2,649 85 C Mid
306 IEEE 802.11i-2004 2,641 85 C Mid
307 FIPS 140 2,635 85 Start Mid
308 Optimal asymmetric encryption padding 2,626 84 Start High
309 Dilly Knox 2,610 84 B Unknown
310 Comparison of disk encryption software 2,587 83 List High
311 List of bitcoin forks 2,586 83 List Low
312 Scrambler 2,585 83 C Unknown
313 Classical cipher 2,531 81 Start Top
314 Keygen 2,525 81 C Low
315 Digital renminbi 2,504 80 B High
316 Hill cipher 2,495 80 Unknown Unknown
317 BB84 2,483 80 Start Low
318 Socialist millionaire problem 2,474 79 Start Unknown
319 Briar (software) 2,472 79 Start Low
320 Key management 2,456 79 Unknown Unknown
321 Privacy and blockchain 2,437 78 C Low
322 HKDF 2,433 78 Start Unknown
323 Hashcash 2,421 78 Start Unknown
324 DNS Certification Authority Authorization 2,406 77 GA Low
325 Twofish 2,404 77 Start High
326 Export of cryptography from the United States 2,401 77 C Unknown
327 Hash chain 2,368 76 Start Unknown
328 Secret sharing 2,351 75 B High
329 Physical unclonable function 2,328 75 Start Unknown
330 Lenstra elliptic-curve factorization 2,314 74 C Low
331 Data anonymization 2,303 74 Start Mid
332 Open Whisper Systems 2,280 73 B Unknown
333 Comparison of cryptographic hash functions 2,276 73 List Low
334 Schnorr signature 2,248 72 C High
335 Trusted Computing 2,243 72 C Mid
336 Strong cryptography 2,227 71 Unknown Unknown
337 Off-the-record messaging 2,226 71 Start Unknown
338 Magic (cryptography) 2,224 71 Start Unknown
339 Tox (protocol) 2,219 71 C Low
340 Crypto Wars 2,219 71 Start High
341 RSA Factoring Challenge 2,169 69 Start Low
342 Opportunistic TLS 2,154 69 Start Mid
343 Algorand 2,150 69 B Low
344 Tor2web 2,145 69 Start Low
345 Dm-crypt 2,140 69 Start Low
346 Clipper chip 2,131 68 C High
347 Martin Hellman 2,119 68 Start High
348 Advanced Encryption Standard process 2,118 68 C Mid
349 CCM mode 2,116 68 Start High
350 Wildcard certificate 2,106 67 Redirect NA
351 S-box 2,099 67 Start Top
352 Filecoin 2,099 67 Stub Low
353 Comparison of cryptography libraries 2,090 67 List Unknown
354 Copiale cipher 2,065 66 Start Low
355 FIPS 140-3 2,060 66 C Low
356 Encryption software 2,056 66 Start Top
357 Ralph Merkle 2,051 66 C High
358 Bouncy Castle (cryptography) 2,023 65 Start Unknown
359 MD4 2,020 65 Start Low
360 Nyctography 2,014 64 Unknown Unknown
361 Comparison of TLS implementations 2,012 64 List High
362 Opportunistic Wireless Encryption 2,010 64 Stub Low
363 FileVault 1,985 64 C Mid
364 Affine cipher 1,977 63 C Low
365 William F. Friedman 1,970 63 C Unknown
366 AES implementations 1,968 63 List Low
367 Cryptanalysis of the Lorenz cipher 1,948 62 C High
368 Ian Goldberg 1,947 62 Start Unknown
369 RSA problem 1,940 62 Start Top
370 Bullrun (decryption program) 1,931 62 B Low
371 Key stretching 1,926 62 Start Unknown
372 Clock drift 1,902 61 C Low
373 Baby-step giant-step 1,897 61 C Unknown
374 Leo Marks 1,896 61 B Unknown
375 Zcash 1,892 61 Start Low
376 Simultaneous Authentication of Equals 1,884 60 Start High
377 Enigma rotor details 1,873 60 Start Mid
378 Alastair Denniston 1,869 60 Start Unknown
379 Generic Security Services Application Program Interface 1,866 60 Start Low
380 Autokey cipher 1,802 58 C Mid
381 Ciphertext indistinguishability 1,797 57 C High
382 Government Communications Security Bureau 1,796 57 B Low
383 Key encapsulation mechanism 1,790 57 Start High
384 Cryptovirology 1,789 57 Start Mid
385 Security level 1,785 57 Stub Mid
386 Charlie Lee (computer scientist) 1,777 57 Start Low
387 Format-preserving encryption 1,774 57 Start High
388 Orbot 1,770 57 Stub Low
389 Double Ratchet Algorithm 1,766 56 Start Low
390 Nothing-up-my-sleeve number 1,756 56 C Low
391 Paillier cryptosystem 1,748 56 Start High
392 SecureDrop 1,748 56 Start Mid
393 Trapdoor function 1,713 55 Start High
394 I. J. Good 1,706 55 C Low
395 Poly1305 1,704 54 Start Top
396 Cryptographic primitive 1,692 54 Start Top
397 Challenge-Handshake Authentication Protocol 1,690 54 Start Low
398 FreeOTP 1,680 54 Start Low
399 Red/black concept 1,672 53 Stub Unknown
400 Mumble (software) 1,671 53 C Unknown
401 Crypt (C) 1,670 53 C High
402 Information-theoretic security 1,665 53 Start Top
403 One-key MAC 1,647 53 Start Low
404 Chosen-plaintext attack 1,641 52 Stub Unknown
405 Hybrid cryptosystem 1,638 52 Start High
406 CBC-MAC 1,630 52 C High
407 Temporal Key Integrity Protocol 1,615 52 C Low
408 Advanced Access Content System 1,608 51 C Mid
409 Jami (software) 1,589 51 Start Unknown
410 CableCARD 1,583 51 B Unknown
411 DeCSS 1,582 51 C Mid
412 UltraViolet (website) 1,575 50 C Low
413 Anonymous P2P 1,574 50 C Low
414 Alberti cipher 1,551 50 C Low
415 Integrated Encryption Scheme 1,546 49 Start Low
416 BLS digital signature 1,533 49 Start Mid
417 W. T. Tutte 1,528 49 C Mid
418 LibreSSL 1,527 49 Start High
419 Secret decoder ring 1,511 48 Start Low
420 Power analysis 1,508 48 Unknown Unknown
421 Code (cryptography) 1,490 48 Start Top
422 Word square 1,490 48 C Low
423 Downgrade attack 1,487 47 Start Mid
424 International Data Encryption Algorithm 1,481 47 C Unknown
425 Black Chamber 1,470 47 Unknown Unknown
426 Blind signature 1,466 47 C Mid
427 Proof of authority 1,463 47 Start Low
428 Public key fingerprint 1,453 46 Start Mid
429 Twisted Edwards curve 1,451 46 C Low
430 Key-agreement protocol 1,449 46 Start Top
431 ADFGVX cipher 1,434 46 Unknown Unknown
432 Shugborough inscription 1,430 46 Start Low
433 Snowflake (software) 1,429 46 Start Low
434 Confusion and diffusion 1,421 45 Start Mid
435 Always-on DRM 1,412 45 Start Low
436 Content Scramble System 1,406 45 Start Mid
437 Null cipher 1,397 45 Stub Low
438 SIGSALY 1,396 45 C Low
439 Differential cryptanalysis 1,394 44 B High
440 Arthur Scherbius 1,394 44 Start Mid
441 Roger Dingledine 1,375 44 Start Unknown
442 Meet-in-the-middle attack 1,370 44 C High
443 Agnes Meyer Driscoll 1,370 44 C Low
444 Tabula recta 1,369 44 Unknown Unknown
445 Jefferson disk 1,368 44 Start Unknown
446 Digital signature forgery 1,362 43 Start High
447 Rotor machine 1,359 43 Unknown Unknown
448 MD6 1,359 43 Start High
449 Key server (cryptographic) 1,357 43 Start Mid
450 Hidden message 1,356 43 Start Low
451 McEliece cryptosystem 1,355 43 C High
452 Two-square cipher 1,355 43 Unknown Unknown
453 ZeroNet 1,351 43 Start Low
454 Codebook 1,346 43 Stub Unknown
455 Multiple encryption 1,340 43 Unknown Unknown
456 MS-CHAP 1,328 42 Start Low
457 SegWit 1,327 42 Start Low
458 National Cryptologic Museum 1,322 42 C Mid
459 Berlekamp–Massey algorithm 1,319 42 Start Unknown
460 Fuzzy hashing 1,315 42 C Low
461 Serpent (cipher) 1,313 42 C Low
462 Tiny Encryption Algorithm 1,312 42 Unknown Unknown
463 Secure cryptoprocessor 1,299 41 C Mid
464 Station HYPO 1,298 41 Start Low
465 Ross J. Anderson 1,294 41 C Mid
466 Random oracle 1,292 41 Start Low
467 Friend-to-friend 1,292 41 Start Low
468 Keybase 1,291 41 Start Low
469 GNUnet 1,287 41 B Low
470 Pollard's kangaroo algorithm 1,286 41 C Low
471 Operation Rubicon 1,278 41 C Low
472 Dorabella Cipher 1,264 40 Unknown Unknown
473 Banburismus 1,264 40 C Low
474 Steganographia 1,262 40 Start Low
475 RIPEMD 1,257 40 C Unknown
476 Visual cryptography 1,257 40 Unknown Unknown
477 Rijndael MixColumns 1,256 40 Start Low
478 Supersingular isogeny key exchange 1,253 40 Start Low
479 David Wheeler (computer scientist) 1,250 40 Start Low
480 Four-square cipher 1,250 40 C Unknown
481 List of steganography techniques 1,250 40 C Low
482 Cipher runes 1,245 40 Start Unknown
483 SYN cookies 1,242 40 Start Unknown
484 One-way compression function 1,239 39 C Top
485 SIGABA 1,233 39 C High
486 Conditional access 1,225 39 C Low
487 Collision resistance 1,222 39 Start High
488 NTRUEncrypt 1,221 39 C Mid
489 NTRU 1,220 39 C Low
490 Integrated Windows Authentication 1,215 39 Start Unknown
491 The Code Book 1,207 38 Start Low
492 List of cryptographers 1,205 38 List Low
493 Open Technology Fund 1,193 38 Start Unknown
494 Great Cipher 1,188 38 Start Mid
495 Shared secret 1,184 38 Stub High
496 Oblivious transfer 1,176 37 Start Unknown
497 Pseudorandom function family 1,164 37 Start Low
498 Electronic Signatures in Global and National Commerce Act 1,156 37 Stub Unknown
499 EncFS 1,156 37 C Low
500 Perfect Dark (P2P) 1,155 37 C Low