Category:Cryptography
| Wikimedia Commons has media related to Cryptography. |
Cryptography is, traditionally, the study of ways to convert information from its normal, comprehensible form into an obscured guise, unreadable without special knowledge — the practice of encryption. In the past, cryptography helped ensure secrecy in important communications, such as those of spies, military leaders, and diplomats. In recent decades, the field of cryptography has expanded its remit. Examples include schemes like digital signatures and digital cash, digital rights management for intellectual property protection, and securing electronic commerce. Cryptography is now often built into the infrastructure for computing and telecommunications; users may not even be aware of its presence.
Subcategories
This category has the following 28 subcategories, out of 28 total.
A
C
D
E
H
K
L
O
P
Q
R
S
T
Σ
Pages in category "Cryptography"
The following 200 pages are in this category, out of 229 total. This list may not reflect recent changes (learn more).
(previous 200) (next 200)A
B
C
- Cipher
- Ciphertext
- Ciphertext expansion
- Ciphertext indistinguishability
- Civision
- Client-side encryption
- Code (cryptography)
- Code word
- Codebook
- Codress message
- Cohen's cryptosystem
- Communications security
- Comparison of cryptographic hash functions
- Completeness (cryptography)
- Computer security
- Concrete security
- Conjugate coding
- Convergent encryption
- Correlation immunity
- Cover (telecommunications)
- Cover-coding
- CRIME
- Critical Security Parameter
- Cryptanalysis
- Crypto Wars
- Cryptochannel
- Cryptographic engineering
- Cryptographic hash function
- Cryptographic High Value Product
- Cryptographic Module Testing Laboratory
- Cryptographic nonce
- Cryptographic Service Provider
- CrypTool
- CryptoNote
- CryptoParty
- Cryptosystem
- Cryptovirology
- CrySyS Lab
- Cypherpunks (book)
D
- Data at Rest
- Data in Use
- Database encryption
- Decipherment
- Deniable encryption
- Designated verifier signature
- Device-independent quantum cryptography
- DigiDoc
- Digital credential
- Digital signature forgery
- Dining cryptographers problem
- Diplomatic bag
- Direct Anonymous Attestation
- Discrete logarithm
- Decentralized Autonomous Organization
E
F
H
K
M
N
P
- Padding (cryptography)
- Passphrase
- Password Authenticated Key Exchange by Juggling
- Password psychology
- Password strength
- Password-based cryptography
- PGP word list
- Pizzino
- PKIoverheid
- Plaintext
- Point to Point Encryption
- Polygraphic substitution
- POODLE
- Post-quantum cryptography
- PRESENT (cipher)
- PrivateCore
- Privilege Management Infrastructure
- Probabilistic encryption
- Proof-of-stake
- Proof-of-work system
- Protocol composition logic
- Provable security
- Proxy re-encryption
- Pseudorandom ensemble
- Pseudorandom generator
S
- S/MIME
- Sacher hexachord
- Salt (cryptography)
- Scrambler
- Secret sharing
- Secure cryptoprocessor
- Secure Hash Algorithm
- Secure Hash Standard
- Secure voice
- Security association
- Security engineering
- Security parameter
- Security through obscurity
- Self-shrinking generator
- Server gated cryptography
- Server-based signatures
- SFINKS
- SIGINT Activity Designator
- Signals intelligence
- Signatures with efficient protocols
- Simon (cipher)
- SIPRNet
- Snake oil (cryptography)
- SnapTag
- Software token
- SPKAC
- Standard model (cryptography)
- Statistically close
- Strong cryptography