Category:Cryptography
![]() | Computing portal |
Here is a list of articles in the Cryptography category of the Computing portal that unifies foundations of mathematics and computations using computers. Cryptography is the study of ways to convert information from its normal, comprehensible form into an obscured guise, unreadable without special knowledge — the practice of encryption. In the past, cryptography helped ensure secrecy in important communications, such as those of spies, military leaders, and diplomats. In recent decades, the field of cryptography has expanded its remit. Examples include schemes like digital signatures and digital cash, digital rights management for intellectual property protection, and securing electronic commerce. Cryptography is now often built into the infrastructure for computing and telecommunications; users may not even be aware of its presence.
Subcategories
This category has the following 13 subcategories, out of 13 total.
A
D
O
P
Q
S
T
Pages in category "Cryptography"
The following 200 pages are in this category, out of 288 total.
(previous page) (next page)- Cryptography (computing)
*
- Outline of cryptography (computing)
1
- 123-reg (company)
A
- Accumulator (cryptography) (computing)
- Adaptive Redaction (computing)
- Anonymous matching (computing)
- Anonymous remailer (computing)
- Array controller based encryption (computing)
B
- Backdoor (computing) (computing)
- Batch cryptography (computing)
- Bcrypt (computing)
- Bitcoin Gold (computing)
- Blacker (security) (computing)
- Blind credential (computing)
- Blinding (cryptography) (computing)
- Blocknots (computing)
- Blom's scheme (computing)
- BREACH (computing)
- Bus encryption (computing)
C
- Chaffing and winnowing (computing)
- Chaotic cryptology (computing)
- Cipher (computing)
- Ciphertext (computing)
- Ciphertext expansion (computing)
- Ciphertext indistinguishability (computing)
- Client-side encryption (computing)
- CloudMask (company)
- Code (cryptography) (computing)
- Code word (computing)
- Codebook (computing)
- Codress message (computing)
- Communications security (computing)
- Comparison of cryptographic hash functions (computing)
- Completeness (cryptography) (computing)
- Computer security (computing)
- Concrete security (computing)
- Conjugate coding (computing)
- Convergent encryption (computing)
- Correlation immunity (computing)
- Cover (telecommunications) (engineering)
- Cover-coding (computing)
- Critical Security Parameter (computing)
- Critical security parameter (computing)
- Cryptanalysis (computing)
- Crypto Wars (computing)
- Crypto-shredding (computing)
- Cryptochannel (computing)
- Cryptographic engineering (computing)
- Cryptographic hash function (computing)
- Cryptographic High Value Product (computing)
- Cryptographic Module Testing Laboratory (organization)
- Cryptographic multilinear map (computing)
- Cryptographic nonce (computing)
- Cryptographic Service Provider (computing)
- CrypTool (software)
- CryptoParty (computing)
- Cryptosystem (computing)
- Cryptovirology (computing)
- CrySyS Lab (computing)
D
- Data at rest (computing)
- Data in use (computing)
- Database encryption (computing)
- Decimal sequences for cryptography (computing)
- Decipherment (computing)
- Deniable encryption (computing)
- Designated verifier signature (computing)
- Devcoin (computing)
- Device-independent quantum cryptography (computing)
- DigiDoc (computing)
- Digital credential (computing)
- Dining cryptographers problem (computing)
- Diplomatic bag (computing)
- Direct Anonymous Attestation (computing)
- Direct Autonomous Authentication (computing)
- Discrete logarithm (computing)
- Discrete Logarithm Problem (DLP) (computing)
- Discriminant Book (computing)
- DogTag (software)
- Dynamic encryption (computing)
E
- EFF DES cracker (computing)
- Election security (computing)
- Electronic signature (computing)
- Encrypted function (computing)
- Encryption (computing)
- End-to-end encryption (computing)
- Enhanced privacy ID (computing)
- Enigma machine (computing)
- Entropic security (computing)
- Ephemeral key (computing)
- ESign (India) (computing)
- Ethash (computing)
F
- Factorization of polynomials over finite fields (computing)
- Feedback with Carry Shift Registers (computing)
- Feistel cipher (computing)
- Floradora (computing)
- Forking lemma (computing)
- Format-preserving encryption (computing)
- Format-transforming encryption (computing)
- Forward anonymity (computing)
- FREAK (computing)
- Fully undetectable (computing)
G
- Garlic routing (computing)
- Generic group model (computing)
- Geometric cryptography (computing)
- Group key (computing)
- Group-IB (company)
H
- Hardware random number generator (computing)
- Hardware-based encryption (computing)
- HashClash (computing)
- Hashgraph (software)
- HKDF (computing)
- Honey encryption (computing)
- HTTP Strict Transport Security (computing)
- Human rights and encryption (computing)
- Hybrid argument (Cryptography) (computing)
- Hybrid cryptosystem (computing)
- Hyper-encryption (computing)
I
- I2P (software)
- Russell Impagliazzo (biography)
- Index of coincidence (computing)
- Information leakage (computing)
- Information security (computing)
- Initialization vector (computing)
J
- Jötunvillur (computing)
K
- Kerckhoffs's principle (computing)
- Key (cryptography) (computing)
- Key ceremony (computing)
- Key checksum value (computing)
- Key derivation function (computing)
- Key distribution in wireless sensor networks (computing)
- Key Management Interoperability Protocol (computing)
- Key Management Interoperability Protocol (KMIP) (computing)
- Key-agreement protocol (computing)
- Key-based routing (computing)
- Keyring (cryptography) (computing)
- KLJN Secure Key Exchange (computing)
- Knapsack cryptosystems (computing)
- Knapsack problem (computing)
- Kurzsignale (computing)
L
- Lattice-based cryptography (computing)
- Lattice problem (computing)
- Lattice reduction (computing)
- Learning with errors (computing)
- Letter frequency (computing)
- Link encryption (computing)
M
- Malleability (cryptography) (computing)
- Mask generation function (computing)
- MDS matrix (computing)
- Mean Shortest Distance (computing)
- Mean shortest distance (computing)
- Memory hard function (computing)
- Mental poker (computing)
- Messaging Layer Security (computing)
- MIME Object Security Services (computing)
- Mimic function (computing)
- Mix network (computing)
- Mlecchita vikalpa (computing)
- Mulabhadra (computing)
- Multiple encryption (computing)
- Musical cryptogram (computing)
N
- Naor–Reingold pseudorandom function (computing)
- Niederreiter cryptosystem (computing)
- NIPRNet (computing)
- Noisy-storage model (computing)
- Non-commutative cryptography (computing)
- Normal basis (computing)
- Nothing up my sleeve number (computing)
- Nothing-up-my-sleeve number (computing)
- NTRUSign (computing)
O
- Offensive Security (company)
- One-time pad (computing)
- One-way function (computing)
- Onion routing (computing)
- Online credentials for learning (computing)
P
- Padding (cryptography) (computing)
- Passphrase (computing)
- Password Authenticated Key Exchange by Juggling (computing)
- Password strength (computing)
- Password-based cryptography (computing)
- Pepper (cryptography) (computing)
- PGP word list (computing)
- Philco computers (computing)
- Pirate Chain (computing)
- Pizzino (computing)
- PKIoverheid (computing)
- Plaintext (computing)
- Point to Point Encryption (computing)
- Polygraphic substitution (computing)
- POODLE (computing)
- Post-quantum cryptography (computing)
- PRESENT (computing)
- Prince (cipher) (computing)
- Private set intersection (computing)
- PrivateCore (company)
- Privilege Management Infrastructure (computing)
- Probabilistic signature scheme (computing)
- Proof of knowledge (computing)
- Proof of space (computing)
- Proof-of-space (computing)
- Proof of stake (computing)