Category:Cryptographic algorithms
![]() | Computing portal |
Here is a list of articles in the category Cryptographic algorithms of the Computing portal that unifies foundations of mathematics and computations using computers.
Subcategories
This category has the following 5 subcategories, out of 5 total.
A
B
C
I
P
Pages in category "Cryptographic algorithms"
The following 59 pages are in this category, out of 59 total.
B
- Bach's algorithm (computing)
- BB84 (computing)
- Beaufort cipher (computing)
- Block cipher mode of operation (computing)
C
- CDMF (computing)
- Ciphertext stealing (computing)
- Common Scrambling Algorithm (computing)
- CryptGenRandom (computing)
- Crypto agility (computing)
- Crypto++ (software)
- Crypto-agility (computing)
- Cryptographically secure pseudorandom number generator (computing)
- Cycles per byte (computing)
D
- Double Ratchet Algorithm (computing)
- Dynamic encryption (computing)
E
- Equihash (computing)
F
- Feedback with Carry Shift Registers (computing)
- Fuzzy extractor (computing)
G
- Generating primes (computing)
- Generation of primes (computing)
- Geometric cryptography (computing)
H
- Hash chain (computing)
- HMAC-based One-time Password algorithm (computing)
I
- Industrial-grade prime (computing)
- ISMACryp (computing)
K
- Key schedule (computing)
- Key Wrap (computing)
- Kochanski multiplication (computing)
L
- Linear-feedback shift register (computing)
- LSH (hash function) (computing)
M
- Master Password (software)
- Master Password (algorithm) (software)
- Mental poker (computing)
- Modular exponentiation (computing)
- Montgomery modular multiplication (computing)
- MOSQUITO (computing)
N
- NSA product types (computing)
P
- PEGASUS (computing)
- PR-CPA advantage (computing)
R
- Random password generator (computing)
- Randomness extractor (computing)
- Randomness merger (computing)
- RC algorithm (computing)
- Residual block termination (computing)
- Ring learning with errors key exchange (computing)
- Rip van Winkle cipher (computing)
S
- S-box (computing)
- Scrypt (computing)
- Secret sharing using the Chinese remainder theorem (computing)
- SecureLog (computing)
- Six-State Protocol (computing)
- Six-state protocol (computing)
- Software taggant (computing)
- Substitution–permutation network (computing)
- Summation generator (computing)
- Supersingular isogeny key exchange (computing)
- Symmetric-key algorithm (computing)
T
- Time-based One-time Password algorithm (computing)
V
- Verifiable random function (computing)