Index of cryptography articles

From HandWiki
Short description: none

Articles related to cryptography include:

A

A5/1 • A5/2 • ABA digital signature guidelines • ABC (stream cipher) • Abraham SinkovAcoustic cryptanalysisAdaptive chosen-ciphertext attack • Adaptive chosen plaintext and chosen ciphertext attack • Advantage (cryptography) • ADFGVX cipher • Adi Shamir • Advanced Access Content System • Advanced Encryption StandardAdvanced Encryption Standard processAdversary • AEAD block cipher modes of operation • Affine cipher • Agnes Meyer Driscoll • AKA (security) • Akelarre (cipher) • Alan Turing • Alastair Denniston • Al Bhed language • Alex Biryukov • Alfred Menezes • Algebraic Eraser • Algorithmically random sequenceAlice and BobAll-or-nothing transform • Alphabetum Kaldeorum • Alternating step generator • American Cryptogram Association • AN/CYZ-10 • Anonymous publication • Anonymous remailer • Antoni Palluth • Anubis (cipher) • Argon2 • ARIA (cipher) • Arlington Hall • Arne Beurling • Arnold Cipher • Array controller based encryption • Arthur Scherbius • Arvid Gerhard Damm • Asiacrypt • AtbashAttribute-based encryptionAttack model • Auguste Kerckhoffs • Authenticated encryptionAuthenticationAuthorization certificate • Autokey cipher • Avalanche effect

B

B-Dienst • Babington Plot • Baby-step giant-step • Bacon's cipher • Banburismus • Bart Preneel • BaseKing • BassOmatic • BATON • BB84Beale ciphers • BEAR and LION ciphers • Beaufort cipherBeaumanor HallBent functionBerlekamp–Massey algorithm • Bernstein v. United States • BestCryptBiclique attack • BID/60 • BID 770 • Bifid cipher • Bill Weisband • Binary Goppa code • Biometric word list • Birthday attackBit-flipping attackBitTorrent protocol encryption • Biuro Szyfrów • Black Chamber • Blaise de Vigenère • Bletchley Park • Blind credential • Blinding (cryptography)Blind signatureBlock cipherBlock cipher mode of operation • Block size (cryptography) • Blowfish (cipher) • Blum Blum Shub • Blum–Goldwasser cryptosystem • Bomba (cryptography) • Bombe • Book cipher • Books on cryptographyBoomerang attack • Boris Hagelin • Bouncy Castle (cryptography)Broadcast encryption • Bruce Schneier • Brute-force attack • Brute Force: Cracking the Data Encryption Standard • Burrows–Abadi–Needham logicBurt Kaliski

C

C2NetC-36 (cipher machine)C-52 (cipher machine)Caesar cipher • Camellia (cipher) • CAPICOM • Capstone (cryptography) • Cardan grille • Card catalog (cryptology) • Carlisle Adams • CAST-128 • CAST-256 • Cayley–Purser algorithmCBC-MACCCM modeCCMPCD-57CDMF • Cellular Message Encryption Algorithm • Centiban • Central Security ServiceCentre for Applied Cryptographic Research • Central Bureau • Certicom • Certificate authorityCertificate-based encryptionCertificateless cryptographyCertificate revocation listCertificate signing requestCertification path validation algorithmChaffing and winnowingChallenge-Handshake Authentication ProtocolChallenge–response authenticationChosen-ciphertext attack • Chosen-plaintext attack • CIKS-1 • Cipher disk • Cipher runes • Cipher security summary • CipherSaberCiphertext expansionCiphertext indistinguishabilityCiphertext-only attackCiphertext stealing • CIPHERUNICORN-A • CIPHERUNICORN-E • Classical cipher • Claude ShannonClaw-free permutation • Cleartext • CLEFIA • Clifford Cocks • Clipper chip • Clock (cryptography) • Clock drift • CMVP • COCONUT98 • CodebookCode (cryptography) • Code talker • Codress messageCold boot attackCollision attackCollision resistanceColossus computerCombined Cipher MachineCommitment schemeCommon Scrambling AlgorithmCommunications securityCommunications Security Establishment • Communication Theory of Secrecy Systems • Comparison of disk encryption softwareComparison of SSH clientsCompleteness (cryptography) • Complexity trap • Computational Diffie–Hellman assumption • Computational hardness assumption • Computer insecurity • Computer and network surveillance • COMSEC equipment • Conch (SSH)Concrete security • Conel Hugh O'Donel Alexander • Confidentiality • Confusion and diffusion • Content-scrambling system • Controlled Cryptographic Item • Corkscrew (program)Correlation immunityCOSICCovert channelCover (telecommunications) • Crab (cipher) • Cramer–Shoup cryptosystem • CRAM-MD5 • CRHF • Crib (cryptanalysis) • CrossCryptCrowds (anonymity network)Crypt (C)Cryptanalysis • Cryptanalysis of the Enigma • Cryptanalysis of the Lorenz cipher • Cryptanalytic computer • Cryptex • Cryptico • Crypto AGCrypto-anarchismCrypto API (Linux)Microsoft CryptoAPICryptoBuddyCryptochannel • CRYPTO (conference) • Cryptogram • Cryptographically Generated AddressCryptographically secure pseudorandom number generator • Cryptographically strong • Cryptographic Application Programming Interface • Cryptographic hash functionCryptographic key typesCryptographic Message SyntaxCryptographic primitiveCryptographic protocolCryptographic Service Provider • Cryptographie indéchiffrable • Cryptography • Cryptography in Japan • Cryptography newsgroups • Cryptography standards • Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age • Cryptologia • Cryptology ePrint ArchiveCryptology Research Society of IndiaCryptomathic • Cryptome • Cryptomeria cipher • Cryptonomicon • CrypToolCrypto phone • Crypto-society • CryptosystemCryptovirologyCRYPTREC • CS-Cipher • Curve25519Curve448Custom hardware attackCycles per byte • Cyclometer • Cypherpunk • Cyrillic Projector

D

D'Agapeyeff cipher • Daniel J. BernsteinData Authentication AlgorithmData Encryption StandardDatagram Transport Layer SecurityDavid Chaum • David Kahn • David Naccache • David Wagner • David Wheeler (computer scientist) • Davies attack • Davies–Meyer hash • DEAL • DeciphermentDecisional Diffie–Hellman assumptionDecorrelation theory • Decrypt • DeCSS • Defence Signals Directorate • Degree of anonymityDelegated Path DiscoveryDelegated Path ValidationDeniable encryption • Derek Taunt • Derived unique key per transaction • DES Challenges • DES supplementary material • DES-X • Deterministic encryption • DFC (cipher) • Dictionary attackDifferential cryptanalysisDifferential-linear attack • Differential power analysis • Diffie–Hellman key exchangeDiffie–Hellman problemDigiCipher 2 • Digital Fortress • Digital rights managementDigital signatureDigital Signature Algorithm • Digital signature forgery • Digital timestamping • Digital watermarking • Dilly Knox • Dining cryptographers problemDiplomatic bagDirect Anonymous AttestationDiscrete logarithmDisk encryptionDisk encryption hardwareDisk encryption softwareDistance-bounding protocolDistinguishing attackDistributed.net • DMA attack • dm-crypt • Dmitry Sklyarov • DomainKeys • Don Coppersmith • Dorabella Cipher • Double Ratchet AlgorithmDoug Stinson • Dragon (cipher) • DRYAD • Dual EC DRBG

E

E0 (cipher) • E2 (cipher) • E4M • EAP-AKA • EAP-SIM • EAX modeECC patentsECHELONECRYPT • Edouard Fleissner von Wostrowitz • Edward Hebern • Edward Scheidt • Edward Travis • EFF DES cracker • Efficient Probabilistic Public-Key Encryption Scheme • EKMS • Electronic Communications Act 2000 • Electronic money • Electronic signatureElectronic voting • ElGamal encryption • ElGamal signature scheme • Eli Biham • Elizebeth Friedman • Elliptic-curve cryptographyElliptic-curve Diffie–Hellman • Elliptic Curve DSA • EdDSAElliptic curve only hash • Elonka Dunin • Encrypted functionEncrypted key exchangeEncrypting File SystemEncryptionEncryption softwareEnigmailEnigma machine • Enigma rotor details • Entrust • Ernst Fetterlein • eSTREAM • Étienne Bazeries • Eurocrypt • EuroCryptExport of cryptographyExtensible Authentication Protocol

F

Fast Software Encryption • Fast syndrome-based hash • FEA-M • FEAL • Feige–Fiat–Shamir identification scheme • Feistel cipher • Félix Delastelle • Fialka • Filesystem-level encryptionFileVaultFill deviceFinancial cryptographyFIPS 140FIPS 140-2Firefly (key exchange protocol)FISH (cipher)Fish (cryptography)FloradoraFluhrer, Mantin and Shamir attackFormat-preserving encryption • Fortezza • Fort George G. Meade • Fortuna (PRNG) • Four-square cipher • Franciszek Pokorny • Frank A. Stevenson • Frank Rowlett • FreenetFreeOTFE • FreeS/WAN • Frequency analysis • Friedrich Kasiski • Fritz-chip • FROG • FROSTBURG • FTP over SSH • Full disk encryption • Full Domain Hash • F. W. Winterbotham

G

Galois/Counter Mode • Gardening (cryptanalysis)GCHQ Bude • GCHQ CSO Morwenstow • GDES • Generic Security Services Application Program InterfaceGeorge Blakley • George Scovell • GGH encryption schemeGGH signature scheme • Gilbert Vernam • GMR (cryptography)GNU Privacy GuardGnuTLS • Goldwasser–Micali cryptosystem • Gordon Welchman • GOST (block cipher) • GOST (hash function)Government Communications Headquarters • Government Communications Security Bureau • Grain (cipher) • Grand Cru (cipher) • Great Cipher • Grill (cryptology) • Grille (cryptography) • Group-based cryptographyGroup signatureGrover's algorithm • Gustave Bertrand • Gwido Langer

H

H.235HAIFA construction • HAIPE • Hans Dobbertin • Hans-Thilo Schmidt • Hard-core predicateHardware random number generatorHardware security module • Harold Keen • Harry Hinsley • Harvest (computer) • HAS-160Hash-based cryptographyHashcashHash chainHash function security summaryHash list • Hasty Pudding cipher • HAVAL • HC-256 • HC-9 • Heath Robinson (codebreaking machine) • Hebern rotor machine • Henri Braquenié • Henryk Zygalski • Herbert Yardley • Hidden Field Equations • Hideki Imai • Hierocrypt • High-bandwidth Digital Content ProtectionHigher-order differential cryptanalysis • Hill cipher • History of cryptographyHMACHMAC-based One-time Password algorithm (HOTP) • Horst Feistel • Howard Heys • Https • Hugo Hadwiger • Hugo Koch • HushmailHut 6Hut 8 • HX-63 • Hybrid cryptosystemHyperelliptic curve cryptographyHyper-encryption

I

Ian Goldberg • IBM 4758 • ICE (cipher) • ID-based cryptography • IDEA NXT • Identification friend or foe • IEEE 802.11i • IEEE P1363I. J. GoodIllegal primeImpossible differential cryptanalysisIndex of coincidence • Indifferent chosen-ciphertext attack • Indistinguishability obfuscation • Indocrypt • Information leakage • Information Security Group • Information-theoretic securityInitialization vectorInteger factorizationIntegral cryptanalysisIntegrated Encryption SchemeIntegrated Windows AuthenticationInterlock protocol • Intermediate certificate authorities • International Association for Cryptologic Research • International Data Encryption Algorithm • Internet Key ExchangeInternet Security Association and Key Management ProtocolInterpolation attack • Invisible ink • IPsec • Iraqi block cipher • ISAAC (cipher) • ISO 19092-2 • ISO/IEC 9797 • Ivan Damgård

J

Jacques Stern • JADE (cypher machine) • James Gillogly • James H. Ellis • James Massey • Jan Graliński • Jan Kowalewski • Japanese naval codes • Java Cryptography ArchitectureJefferson diskJennifer Seberry • Jerzy Różycki • Joan Daemen • Johannes Trithemius • John Herivel • John Kelsey (cryptanalyst) • John R. F. Jeffreys • John Tiltman • Jon Lech Johansen • Josef Pieprzyk • Joseph Desch • Joseph Finnegan (cryptographer) • Joseph Mauborgne • Joseph Rochefort • Journal of Cryptology • Junger v. Daley

K

Kaisa Nyberg • Kalyna (cipher) • Kasiski examinationKASUMIKCDSAKeePassKerberos (protocol)Kerckhoffs's principleKevin McCurley (cryptographer)Key-agreement protocolKey authenticationKey clusteringKey (cryptography)Key derivation functionKey distribution centerKey escrowKey exchangeKeyfileKey generationKey generatorKey managementKey-recovery attackKey scheduleKey server (cryptographic)Key signature (cryptography)KeysigningKey signing partyKey sizeKey space (cryptography) • Keystream • Key stretchingKey whitening • KG-84 • KHAZAD • Khufu and Khafre • Kiss (cryptanalysis) • KL-43 • KL-51 • KL-7 • Kleptography • KN-Cipher • Knapsack problemKnown-key distinguishing attackKnown-plaintext attackKnownSafeKOI-18 • KOV-14 • Kryha • Kryptos • KSD-64 • Kupyna • Kuznyechik • KW-26 • KW-37 • KY-3 • KY-57 • KY-58 • KY-68 • KYK-13

L

Lacida • Ladder-DES • Lamport signature • Lars Knudsen • Lattice-based cryptography • Laurance Safford • Lawrie Brown • LCS35 • Leo Marks • Leonard AdlemanLeon Battista Alberti • Leo Rosen • Leslie Yoxall • LEVIATHAN (cipher) • LEX (cipher) • Libelle (cipher) • Linear cryptanalysisLinear-feedback shift registerLink encryption • List of ciphertexts • List of cryptographers • List of cryptographic file systems • List of cryptographic key types • List of cryptology conferences • List of telecommunications encryption terms • List of people associated with Bletchley Park •

List of SFTP clients  •

List of SFTP server software • LOKI • LOKI97 • Lorenz cipher • Louis W. Tordella • Lsh • Lucifer (cipher) • Lyra2

M

M6 (cipher) • M8 (cipher) • M-209 • M-325 • M-94 • MacGuffin (cipher) • Madryga • MAGENTA • Magic (cryptography) • Maksymilian Ciężki • Malcolm J. Williamson • Malleability (cryptography)Man-in-the-middle attack • Marian Rejewski • MARS (cryptography) • Martin Hellman • MaruTukku • Massey–Omura cryptosystem • Matt Blaze • Matt Robshaw • Max Newman • McEliece cryptosystemmcrypt • MD2 (cryptography) • MD4MD5MD5CRKMDC-2MDS matrixMean shortest distanceMeet-in-the-middle attackMental poker • Mercury (cipher machine) • Mercy (cipher) • Meredith Gardner • Merkle signature schemeMerkle–Damgård constructionMerkle–Hellman knapsack cryptosystem • Merkle's Puzzles • Merkle tree • MESH (cipher) • Message authenticationMessage authentication codeMessage forgeryMI8Michael Luby • MICKEY • Microdot • Military Cryptanalysis (book) (William F. Friedman) • Military CryptanalyticsMimic function • Mirror writing • MISTY1 • Mitsuru Matsui • MMB (cipher) • Mod n cryptanalysisMQVMS-CHAP • MUGI • MULTI-S01 • MultiSwap • Multivariate cryptography

N

National Communications Centre • National Cryptologic MuseumNational Security Agency • National Cipher Challenge • Navajo I • Neal KoblitzNeedham–Schroeder protocolNegligible function • NEMA (machine) • NESSIENetwork Security ServicesNeural cryptography • New Data Seal • NewDES • N-Hash • Nicolas Courtois • Niederreiter cryptosystem • Niels Ferguson • Nigel de Grey • Nihilist cipher • Nikita Borisov • Nimbus (cipher) • NIST hash function competitionNonlinear-feedback shift register • NOEKEON • Non-malleable codes • Noreen • Nothing up my sleeve number • NSA cryptography • NSA encryption systems • NSA in fiction • NSAKEYNSA Suite A CryptographyNSA Suite B CryptographyNT LAN ManagerNTLMSSPNTRUEncryptNTRUSign • Null cipher • Numbers station • NUSH • NTRU

O

Oblivious transferOCB modeOded GoldreichOff-the-Record Messaging • Okamoto–Uchiyama cryptosystem • OMI cryptograph • OMNI (SCIP)One-key MACOne-time padOne-time passwordOne-way compression functionOne-way functionOnion routingOnline Certificate Status ProtocolOP-20-G • OpenPGP card • OpenSSHOpenSSLOpenswanOpenVPN • Operation Ruthless • Optimal asymmetric encryption padding • Over the Air Rekeying (OTAR) • OTFE • Otway–Rees protocol

P

Padding (cryptography)Padding oracle attack • Paillier cryptosystem • Pairing-based cryptographyPanama (cryptography)Partitioning cryptanalysisPassive attackPassphrasePasswordPassword-authenticated key agreementPassword crackingPassword Hashing Competition • Paul Kocher • Paulo Pancatuccio • Paulo S. L. M. Barreto • Paul van Oorschot • PBKDF2PC BrunoPepper (cryptography) • Perfect forward secrecy • Perforated sheets • Permutation cipher • Peter Gutmann (computer scientist) • Peter Junger • Peter Twinn • PGP CorporationPGPDiskPGPfone • Phelix • Phil Zimmermann • Photuris (protocol) • Physical security • Physical unclonable functionPig Latin • Pigpen cipher • Pike (cipher) • Piling-up lemmaPinwheel (cryptography) • Piotr Smoleński • Pirate decryption • PKC (conference) • PKCSPKCS 11PKCS 12 • PKIX • PlaintextPlaintext-aware encryption • Playfair cipher • Plugboard • PMAC (cryptography) • Poem code • Pohlig–Hellman algorithmPoint-to-Point Tunneling ProtocolPointcheval–Stern signature algorithmPoly1305 • Polyalphabetic cipher • Polybius square • Portex • Post-quantum cryptographyPost-Quantum Cryptography Standardization • Power analysis • Preimage attackPre-shared keyPretty Good Privacy • Printer steganography • Privacy-enhanced Electronic Mail • Private Communications TechnologyPrivate information retrievalProbabilistic encryption • Product cipher • Proof-of-work systemProtected Extensible Authentication ProtocolProvable security • Provably secure cryptographic hash function • Proxy re-encryptionPseudo-Hadamard transformPseudonymity • Pseudorandom function • Pseudorandom number generatorPseudorandom permutationPublic key certificatePublic-key cryptographyPublic key fingerprintPublic key infrastructure • PURPLE • PuTTY • Py (cipher)

Q

Q (cipher) • Qrpff • QUAD (cipher) • Quadratic sieveQuantum coin flippingQuantum cryptographyQuantum digital signatureQuantum fingerprintingQuantum key distribution

R

Rabbit (cipher) • Rabin cryptosystem • Rabin–Williams encryption • RadioGatún • Rail fence cipher • Rainbow tableRalph Merkle • Rambutan (cryptography) • Random function • Randomness testsRandom number generator attackRandom oracle • RC2 • RC4 • RC5 • RC6 • Rebound attack • Reciprocal cipher • Red/black concept • REDOC • Red Pike (cipher) • Reflector (cipher machine) • Regulation of Investigatory Powers Act 2000 • Reihenschieber • Rekeying (cryptography)Related-key attackReplay attack • Reservehandverfahren • Residual block terminationRijndael key scheduleRijndael S-boxRing signatureRIPEMDRip van Winkle cipherRobert Morris (cryptographer) • Robot certificate authority • Rockex • Rolf Noskwith • Ron RivestRoom 40Root certificateRoss J. Anderson • Rossignols • ROT13 • Rotor machine • RSA RSA • RSA-100 • RSA-1024 • RSA-110 • RSA-120 • RSA-129 • RSA-130 • RSA-140 • RSA-150 • RSA-1536 • RSA-155 • RSA-160 • RSA-170 • RSA-180 • RSA-190 • RSA-200 • RSA-2048 • RSA-210 • RSA-220 • RSA-230 • RSA-232 • RSA-240 • RSA-250 • RSA-260 • RSA-270 • RSA-280 • RSA-290 • RSA-300 • RSA-309 • RSA-310 • RSA-320 • RSA-330 • RSA-340 • RSA-350 • RSA-360 • RSA-370 • RSA-380 • RSA-390 • RSA-400 • RSA-410 • RSA-420 • RSA-430 • RSA-440 • RSA-450 • RSA-460 • RSA-470 • RSA-480 • RSA-490 • RSA-500 • RSA-576 • RSA-617 • RSA-640 • RSA-704 • RSA-768 • RSA-896 • RSA-PSS • RSA Factoring ChallengeRSA problem • RSA Secret-Key Challenge • RSA SecurityRubber-hose cryptanalysis • Running key cipher • Russian copulation

S

S-1 block cipher • SAFER • Salsa20Salt (cryptography) • SAM card • Security Support Provider InterfaceSAML • SAVILLE • SC2000 • Schnorr groupSchnorr signatureSchoof–Elkies–Atkin algorithmSCIP • Scott Vanstone • ScramblerScramdisk • Scream (cipher) • ScryptScytaleSeahorse • SEAL (cipher) • Sean Murphy (cryptographer) • SECGSecret broadcastSecret decoder ring • Secrets and Lies (Schneier) • Secret sharingSectéra Secure ModuleSecure access moduleSecure channelSecure Communication based on Quantum CryptographySecure copySecure cryptoprocessorSecure Electronic TransactionSecure Hash AlgorithmsSecure Hypertext Transfer ProtocolSecure key issuing cryptographySecure multi-party computationSecure Neighbor DiscoverySecure Real-time Transport Protocol • Secure remote password protocol • Secure Shell • Secure telephone • Secure Terminal EquipmentSecure voice • SecurID • Security associationSecurity engineeringSecurity levelSecurity parameterSecurity protocol notationSecurity through obscuritySecurity token • SEED • Selected Areas in Cryptography • Self-certifying File SystemSelf-shrinking generatorSelf-signed certificateSemantic security • Serge Vaudenay • Serpent (cipher)Session key • SHACAL • Shafi GoldwasserSHA-1SHA-2SHA-3Shared secret • SHARK • Shaun WylieShor's algorithmShrinking generator • Shugborough inscription • Side-channel attackSiemens and Halske T52SIGABASIGCUM • SIGINT • Signal ProtocolSignal Intelligence ServiceSigncryptionSIGSALYSILC (protocol)Silvio MicaliSimple Authentication and Security LayerSimple public-key infrastructure • Simple XOR cipher • S/KEY • Skein (hash function) • Skipjack (cipher) • Slide attack • Slidex • Small subgroup confinement attack • S/MIME • SM4 algorithm (formerly SMS4) • Snake oil (cryptography)Snefru • SNOW • Snuffle • SOBER-128 • Solitaire (cipher)Solomon Kullback • SOSEMANUK • Special Collection Service • Spectr-H64 • SPEKE (cryptography) • Sponge functionSPNEGO • Square (cipher) • Ssh-agentSsh-keygenSSH File Transfer ProtocolSSLeay • Stafford Tavares • Standard model (cryptography)Station CASTStation HYPO • Station-to-Station protocol • Statistical cryptanalysis • Stefan Lucks • Steganalysis • Steganography • Straddling checkerboard • Stream cipherStream cipher attacksStrong cryptography • Strong RSA assumption • Stuart Milner-Barry • STU-II • STU-III • Stunnel • Substitution box • Substitution cipherSubstitution–permutation network • Superencryption • Supersingular isogeny key exchange • Swedish National Defence Radio Establishment • SWIFFT • SXAL/MBAL • Symmetric-key algorithm • SYSKEY

T

Tabula recta • Taher Elgamal • Tamper resistanceTcpcryptTelevision encryptionTEMPEST • Template:Cryptographic software • Temporal Key Integrity Protocol • Testery • Thawte • The Alphabet Cipher • The Code Book • The Codebreakers • The Gold-Bug • The Magic Words are Squeamish Ossifrage • Theory of Cryptography Conference • The world wonders • Thomas Jakobsen • Three-pass protocolThreshold shadow scheme • TICOM • Tiger (cryptography) • Timeline of cryptography • Time/memory/data tradeoff attack • Time-based One-time Password algorithm (TOTP) • Timing attack • Tiny Encryption Algorithm • Tom BersonTommy Flowers • Topics in cryptography • Tor (anonymity network)Torus-based cryptographyTraffic analysis • Traffic-flow security • Traitor tracingTransmission securityTransport Layer SecurityTransposition cipherTrapdoor function • Trench code • Treyfer • Trifid cipher • Triple DES • Trivium (cipher) • TrueCryptTruncated differential cryptanalysisTrusted third party • Turing (cipher) • TWINKLE • TWIRL • Twofish • Two-square cipher • Type 1 encryption • Type 2 encryption • Type 3 encryption • Type 4 encryption • Typex

U

UES (cipher) • Ultra (cryptography)UMACUnbalanced Oil and VinegarUndeniable signatureUnicity distanceUniversal composabilityUniversal one-way hash function (UOWHF)

V

Venona project • Verifiable secret sharingVerisignVery smooth hashVEST • VIC cipher • VideoCrypt • Vigenère cipher • Vincent Rijmen • VINSON • Virtual private networkVisual cryptography • Voynich manuscript

W

Wadsworth's cipher • WAKE • WLAN Authentication and Privacy InfrastructureWatermark (data file)Watermarking attackWeak keyWeb of trustWhirlpool (hash function)Whitfield DiffieWide Mouth Frog protocolWi-Fi Protected Access • William F. Friedman • William Montgomery (cryptographer) • WinSCPWired Equivalent PrivacyWireless Transport Layer SecurityWitness-indistinguishable proof • Workshop on Cryptographic Hardware and Embedded Systems • World War I cryptography • World War II cryptography • W. T. Tutte

X

X.509XDH assumption • Xiaoyun Wang • XML EncryptionXML Signature • xmx • XSL attack • XTEA • XTR • Xuejia Lai • XXTEA 10-00-00-00-00

Y

Yarrow algorithmY-stations • Yuliang Zheng

Z

ZeroisationZero-knowledge password proofZero-knowledge proofZfone • Zodiac (cipher) • ZRTPZimmermann–Sassaman key-signing protocol • Zimmermann Telegram

See also