Category:Applications of cryptography
![]() | Computing portal |
Here is a list of articles in the category Applications of cryptography of the Computing portal that unifies foundations of mathematics and computations using computers.
![]() |
Wikimedia Commons has media related to Applications of cryptography. |
See also
Subcategories
This category has the following 5 subcategories, out of 5 total.
A
C
E
F
Pages in category "Applications of cryptography"
The following 34 pages are in this category, out of 34 total.
A
- All-or-nothing transform (computing)
- Authentication (computing)
B
- Bingo voting (computing)
- Broadcast encryption (computing)
C
- Code signing (computing)
- Confidentiality (computing)
- Crypto-anarchism (computing)
- Cryptocurrency (computing)
D
- Decentralized autonomous organization (computing)
E
- E-imza (computing)
F
- Foreign instrumentation signals intelligence (computing)
- Friend-to-friend (computing)
L
- LinOTP (software)
M
- MormonLeaks (organization)
- MultiOTP (software)
O
- OpenBSD Cryptographic Framework (computing)
- OpenPuff (software)
P
- Passwordless authentication (computing)
- Prêt à Voter (computing)
- Pseudonymity (computing)
- Publicly Verifiable Secret Sharing (computing)
- Punchscan (computing)
R
- Radiofrequency MASINT (computing)
- Risk-based authentication (computing)
- Rublon (software)
S
- Scantegrity (computing)
- Signals intelligence by alliances, nations and industries (computing)
- Signals intelligence operational platforms by nation (computing)
- Steganography tools (computing)
T
- Traitor tracing (computing)
- Truth & Transparency Foundation (organization)
X
- X.1035 (computing)