Category:Cryptographic protocols
![]() | Computing portal |
Here is a list of articles in the Cryptographic protocols category of the Computing portal that unifies foundations of mathematics and computations using computers. Cryptographic protocols — the communication protocols designed and available to provide computer security assurances using cryptographic mechanisms.
- Classic assurances include internet protocols for confidentiality and message integrity — and more recent research includes anonymity assurances. The term "protocol" is used in a wide sense, to include off-line arrangements such as encryption of email messages.
Subcategories
This category has the following 3 subcategories, out of 3 total.
A
T
Pages in category "Cryptographic protocols"
The following 133 pages are in this category, out of 133 total.
- Cryptographic protocol (computing)
3
- 3-D Secure (computing)
A
- Alice and Bob (computing)
- ALTS (computing)
- Anshel–Anshel–Goldfeld key exchange (computing)
- ANSI ASC X9.95 Standard (computing)
- Anti-replay (computing)
- AS1 (networking) (computing)
- AS2 (computing)
- Authentication and Key Agreement (computing)
- Authentication and Key Agreement (protocol) (computing)
- AuthIP (computing)
- Automated Certificate Management Environment (computing)
- Autoroll (computing)
B
- BGPsec (computing)
- Bilateral key exchange (computing)
- BitTorrent protocol encryption (computing)
- Broadcast to Allied Merchant Ships (computing)
C
- CAVE-based authentication (computing)
- CCMP (cryptography) (computing)
- CECPQ1 (computing)
- CECPQ2 (computing)
- Certificate Management over CMS (computing)
- Certificate Management Protocol (computing)
- Certification path validation algorithm (computing)
- Code Access Security (computing)
- Cryptographic Message Syntax (computing)
- Cryptographically Generated Address (computing)
D
- Datagram Transport Layer Security (computing)
- Delegated credential (computing)
- Delegated Path Discovery (computing)
- Delegated Path Validation (computing)
- Deniable authentication (computing)
- Digest access authentication (computing)
- DigiCipher 2 (engineering)
- Digital credential (computing)
- Distance-bounding protocol (computing)
- Distributed System Security Architecture (computing)
- DomainKeys (computing)
- DomainKeys Identified Mail (computing)
E
- Ecash (computing)
- Encrypted key exchange (computing)
- Enrollment over Secure Transport (computing)
F
- Firefly (key exchange protocol) (computing)
G
- Garbled circuit (computing)
- Garlic routing (computing)
- Generic Bootstrapping Architecture (computing)
- Grid Security Infrastructure (computing)
- Group Domain of Interpretation (computing)
H
- H.235 (computing)
- Hashcash (computing)
- High Assurance Internet Protocol Encryptor (computing)
- Host Identity Protocol (computing)
- HTTPS (computing)
- HTTPsec (computing)
I
- I2P (software)
- IEEE 802.11i-2004 (computing)
- Integrated Encryption Scheme (computing)
- Internet Key Exchange (computing)
- Internet Security Association and Key Management Protocol (organization)
- IPsec (computing)
J
- JSON Web Encryption (computing)
K
- Kak's three stage protocol (computing)
- Kerberized Internet Negotiation of Keys (computing)
- Key exchange (computing)
- Key Management Interoperability Protocol (computing)
- Key Management Interoperability Protocol (KMIP) (computing)
- Key-based routing (computing)
M
- Massey-Omura cryptosystem (computing)
- Massey-omura cryptosystem (computing)
- Microsoft Point-to-Point Encryption (computing)
- MIKEY (computing)
- Mix network (computing)
- Multi-party fair exchange protocol (computing)
N
- Neuman–Stubblebine protocol (computing)
- NewHope (computing)
O
- Oak Orion (computing)
- Oakley protocol (computing)
- OCSP stapling (computing)
- Off-the-Record Messaging (software)
- Offline private key protocol (computing)
- OMEMO (computing)
- Onion routing (computing)
- Online Certificate Status Protocol (computing)
- Openswan (software)
P
- Password Authenticated Key Exchange by Juggling (computing)
- Piggy bank cryptography (computing)
- Privacy-Enhanced Mail (computing)
- Private Communications Technology (engineering)
- Proof of secure erasure (computing)
- Protocol for Carrying Authentication for Network Access (computing)
- Public-key cryptography (computing)
- Publius (publishing system) (computing)
S
- Salted Challenge Response Authentication Mechanism (computing)
- SCVP (computing)
- Secure Communications Interoperability Protocol (computing)
- Secure copy (software)
- Secure Hypertext Transfer Protocol (computing)
- Secure multi-party computation (computing)
- Secure Neighbor Discovery (computing)
- Secure Real-time Transport Protocol (computing)
- Security Protocols Open Repository (computing)
- Shamir three-pass protocol (computing)
- Signal Protocol (computing)
- Signature Record Type Definition (computing)
- Silent Circle Instant Messaging Protocol (computing)
- Simple Authentication and Security Layer (computing)
- Simple Certificate Enrollment Protocol (computing)
- Simultaneous Authentication of Equals (computing)
- SPNEGO (computing)
- SSH File Transfer Protocol (computing)
T
- TACLANE (computing)
- Tcpcrypt (software)
- Temporal Key Integrity Protocol (computing)
- Threshold shadow scheme (computing)
- Time stamp protocol (computing)
- Tor (anonymity network) (software)
- List of Tor hidden services (computing)
- List of Tor onion services (computing)
- Transport Layer Security (computing)
V
- Vouch by Reference (computing)
W
- Wi-Fi Protected Access (computing)
- Wi-Fi Protected Setup (computing)
- Wired Equivalent Privacy (computing)
- Wireless Transport Layer Security (computing)
- WLAN Authentication and Privacy Infrastructure (computing)
Y
- Yahalom (protocol) (computing)
- YAK (cryptography) (computing)
Z
- Zimmermann–Sassaman key-signing protocol (computing)
- ZRTP (computing)