Category:Cryptography
Here is a list of articles in the Cryptography category of the Computing portal that unifies foundations of mathematics and computations using computers.
Pages in this category should be moved to subcategories where applicable. This category may require frequent maintenance to avoid becoming too large. It should directly contain very few, if any, pages and should mainly contain subcategories. |
Cryptography is the study of ways to convert information from its normal, comprehensible form into an obscured guise, unreadable without special knowledge — the practice of encryption. In the past, cryptography helped ensure secrecy in important communications, such as those of spies, military leaders, and diplomats. In recent decades, the field of cryptography has expanded its remit. Examples include schemes like digital signatures and digital cash, digital rights management for intellectual property protection, and securing electronic commerce. Cryptography is now often built into the infrastructure for computing and telecommunications; users may not even be aware of its presence.
Subcategories
This category has the following 13 subcategories, out of 13 total.
Pages in category "Cryptography"
The following 200 pages are in this category, out of 249 total.
(previous page) (next page)A
B
C
- Chaffing and winnowing
- Chaos Communication Congress
- Chaotic cryptology
- Cipher
- Ciphertext
- Ciphertext expansion
- Client-side encryption
- Company:CloudMask
- Code (cryptography)
- Code word
- Code word (communication)
- Social:Codebook
- Codress message
- Software:Colored Coins
- Communications security
- Completeness (cryptography)
- Computer security
- Conjugate coding
- Convergent encryption
- Correlation immunity
- Engineering:Cover (telecommunications)
- Cover-coding
- Critical Security Parameter
- Critical security parameter
- Finance:Crypto naming controversy
- Cryptochannel
- Cryptographic engineering
- Cryptographic High Value Product
- Cryptographic module
- Organization:Cryptographic Module Testing Laboratory
- Cryptographic multilinear map
- Cryptographic nonce
- Cryptographic Service Provider
- Software:CrypTool
- CryptoParty
- Cryptosystem
- Cryptovirology
- CrySyS Lab
D
- Data at rest
- Data in use
- Database encryption
- Decimal sequences for cryptography
- Biology:Decipherment
- Deniable encryption
- Designated verifier signature
- Finance:Devcoin
- Dining cryptographers problem
- Direct Anonymous Attestation
- Direct Autonomous Authentication
- Discrete logarithm
- Discrete Logarithm Problem (DLP)
- Discriminant Book
- Software:DogTag
E
F
H
K
M
N
P
- Padding (cryptography)
- Passphrase
- Password strength
- Password-authenticated key agreement
- Password-based cryptography
- Pepper (cryptography)
- PGP word list
- Philco computers
- PhotoDNA
- Finance:Pirate Chain
- Pizzino
- PKIoverheid
- Plaintext
- Point to Point Encryption
- Point-to-point encryption
- Polygraphic substitution
- POODLE
- PRESENT
- Prince (cipher)
- Private set intersection
- Company:PrivateCore
- Privilege Management Infrastructure
- Probabilistic signature scheme
- Finance:Proof of identity (blockchain consensus)
- Proof of knowledge
- Finance:Proof of personhood
- Finance:Proof of space
- Finance:Proof of Space and Time
- Finance:Proof of stake
- Finance:Proof-of-space
- Finance:Proof-of-stake
- Finance:Proof of work
- Finance:Proof-of-work system
- Protocol composition logic
- Pseudorandom ensemble
- Pseudorandom generator
- PURB (cryptography)