Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Index of cryptography articles
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|none}} Articles related to cryptography include: ==A== [[A5/1]] [[Talk:A5/1| ]] • [[A5/2]] [[Talk:A5/2| ]] • [[ABA digital signature guidelines]] [[Talk:ABA digital signature guidelines| ]] • [[ABC (stream cipher)]] [[Talk:ABC (stream cipher)| ]] • [[Abraham Sinkov]] [[Talk:Abraham Sinkov| ]] • [[Acoustic cryptanalysis]] [[Talk:Acoustic cryptanalysis| ]] • [[Adaptive chosen-ciphertext attack]] [[Talk:Adaptive chosen-ciphertext attack| ]] • [[Adaptive chosen plaintext and chosen ciphertext attack]] [[Talk:Adaptive chosen plaintext and chosen ciphertext attack| ]] • [[Advantage (cryptography)]] [[Talk:Advantage (cryptography)| ]] • [[ADFGVX cipher]] [[Talk:ADFGVX cipher| ]] • [[Adi Shamir]] [[Talk:Adi Shamir| ]] • [[Advanced Access Content System]] [[Talk:Advanced Access Content System| ]] • [[Advanced Encryption Standard]] [[Talk:Advanced Encryption Standard| ]] • [[Advanced Encryption Standard process]] [[Talk:Advanced Encryption Standard process| ]] • [[Adversary (cryptography)|Adversary]] [[Talk:Adversary| ]] • [[AEAD block cipher modes of operation]] [[Talk:AEAD block cipher modes of operation| ]] • [[Affine cipher]] [[Talk:Affine cipher| ]] • [[Agnes Meyer Driscoll]] [[Talk:Agnes Meyer Driscoll| ]] • [[AKA (security)]] [[Talk:AKA (security)| ]] • [[Akelarre (cipher)]] [[Talk:Akelarre (cipher)| ]] • [[Alan Turing]] [[Talk:Alan Turing| ]] • [[Alastair Denniston]] [[Talk:Alastair Denniston| ]] • [[Al Bhed language]] [[Talk:Al Bhed language| ]] • [[Alex Biryukov]] [[Talk:Alex Biryukov| ]] • [[Alfred Menezes]] [[Talk:Alfred Menezes| ]] • [[Algebraic Eraser]] [[Talk:Algebraic Eraser| ]] • [[Algorithmically random sequence]] [[Talk:Algorithmically random sequence| ]] • [[Alice and Bob]] [[Talk:Alice and Bob| ]] • [[All-or-nothing transform]] [[Talk:All-or-nothing transform| ]] • [[Alphabetum Kaldeorum]] [[Talk:Alphabetum Kaldeorum| ]] • [[Alternating step generator]] [[Talk:Alternating step generator| ]] • [[American Cryptogram Association]] [[Talk:American Cryptogram Association| ]] • [[AN/CYZ-10]] [[Talk:AN/CYZ-10| ]] • [[Anonymous publication]] [[Talk:Anonymous publication| ]] • [[Anonymous remailer]] [[Talk:Anonymous remailer| ]] • [[Antoni Palluth]] [[Talk:Antoni Palluth| ]] • [[Anubis (cipher)]] [[Talk:Anubis (cipher)| ]] • [[Argon2]] [[Talk:Argon2| ]] • [[ARIA (cipher)]] [[Talk:ARIA (cipher)| ]] • [[Arlington Hall]] [[Talk:Arlington Hall| ]] • [[Arne Beurling]] [[Talk:Arne Beurling| ]] • [[Arnold Cipher]] [[Talk:Arnold Cipher| ]] • [[Array controller based encryption]] [[Talk:Array controller based encryption| ]] • [[Arthur Scherbius]] [[Talk:Arthur Scherbius| ]] • [[Arvid Gerhard Damm]] [[Talk:Arvid Gerhard Damm| ]] • [[Asiacrypt]] [[Talk:Asiacrypt| ]] • [[Atbash]] [[Talk:Atbash| ]] • [[Attribute-based encryption]] [[Talk:Attribute-based encryption| ]] • [[Attack model]] [[Talk:Attack model| ]] • [[Auguste Kerckhoffs]] [[Talk:Auguste Kerckhoffs| ]] • [[Authenticated encryption]] [[Talk:Authenticated encryption| ]] • [[Authentication]] [[Talk:Authentication| ]] • [[Authorization certificate]] [[Talk:Authorization certificate| ]] • [[Autokey cipher]] [[Talk:Autokey cipher| ]] • [[Avalanche effect]] [[Talk:Avalanche effect| ]] ==B== [[B-Dienst]] [[Talk:B-Dienst| ]] • [[Babington Plot]] [[Talk:Babington Plot| ]] • [[Baby-step giant-step]] [[Talk:Baby-step giant-step| ]] • [[Bacon's cipher]] [[Talk:Bacon's cipher| ]] • [[Banburismus]] [[Talk:Banburismus| ]] • [[Bart Preneel]] [[Talk:Bart Preneel| ]] • [[BaseKing]] [[Talk:BaseKing| ]] • [[BassOmatic]] [[Talk:BassOmatic| ]] • [[BATON]] [[Talk:BATON| ]] • [[BB84]] [[Talk:BB84| ]] • [[Beale ciphers]] [[Talk:Beale ciphers| ]] • [[BEAR and LION ciphers]] [[Talk:BEAR and LION ciphers| ]] • [[Beaufort cipher]] [[Talk:Beaufort cipher| ]] • [[Beaumanor Hall]] [[Talk:Beaumanor Hall| ]] • [[Bent function]] [[Talk:Bent function| ]] • [[Berlekamp–Massey algorithm]] [[Talk:Berlekamp–Massey algorithm| ]] • [[Bernstein v. United States]] [[Talk:Bernstein v. United States| ]] • [[BestCrypt]] [[Talk:BestCrypt| ]] • [[Biclique attack]] [[Talk:Biclique attack| ]] • [[BID/60]] [[Talk:BID/60| ]] • [[BID 770]] [[Talk:BID 770| ]] • [[Bifid cipher]] [[Talk:Bifid cipher| ]] • [[Bill Weisband]] [[Talk:Bill Weisband| ]] • [[Binary Goppa code]] [[Talk:Binary Goppa code| ]] • [[Biometric word list]] [[Talk:Biometric word list| ]] • [[Birthday attack]] [[Talk:Birthday attack| ]] • [[Bit-flipping attack]] [[Talk:Bit-flipping attack| ]] • [[BitTorrent protocol encryption]] [[Talk:BitTorrent protocol encryption| ]] • [[Biuro Szyfrów]] [[Talk:Biuro Szyfrów| ]] • [[Black Chamber]] [[Talk:Black Chamber| ]] • [[Blaise de Vigenère]] [[Talk:Blaise de Vigenère| ]] • [[Bletchley Park]] [[Talk:Bletchley Park| ]] • Blind credential [[Talk:Blind credential| ]] • [[Blinding (cryptography)]] [[Talk:Blinding (cryptography)| ]] • [[Blind signature]] [[Talk:Blind signature| ]] • [[Block cipher]] [[Talk:Block cipher| ]] • [[Block cipher mode of operation]] [[Talk:Block cipher mode of operation| ]] • [[Block size (cryptography)]] [[Talk:Block size (cryptography)| ]] • [[Blowfish (cipher)]] [[Talk:Blowfish (cipher)| ]] • [[Blum Blum Shub]] [[Talk:Blum Blum Shub| ]] • [[Blum–Goldwasser cryptosystem]] [[Talk:Blum–Goldwasser cryptosystem| ]] • [[Bomba (cryptography)]] [[Talk:Bomba (cryptography)| ]] • [[Bombe]] [[Talk:Bombe| ]] • [[Book cipher]] [[Talk:Book cipher| ]] • [[Books on cryptography]] [[Talk:Books on cryptography| ]] • [[Boomerang attack]] [[Talk:Boomerang attack| ]] • [[Boris Hagelin]] [[Talk:Boris Hagelin| ]] • [[Bouncy Castle (cryptography)]] [[Talk:Bouncy Castle (cryptography)| ]] • [[Broadcast encryption]] [[Talk:Broadcast encryption| ]] • [[Bruce Schneier]] [[Talk:Bruce Schneier| ]] • [[Brute-force attack]] [[Talk:Brute-force attack| ]] • [[Brute Force: Cracking the Data Encryption Standard]] [[Talk:Brute Force: Cracking the Data Encryption Standard| ]] • [[Burrows–Abadi–Needham logic]] [[Talk:Burrows–Abadi–Needham logic| ]] • [[Burt Kaliski]] [[Talk:Burt Kaliski| ]] ==C== [[C2Net]] [[Talk:C2Net| ]] • [[C-36 (cipher machine)]] [[Talk:C-36 (cipher machine)| ]] • [[C-52 (cipher machine)]] [[Talk:C-52 (cipher machine)| ]] • [[Caesar cipher]] [[Talk:Caesar cipher| ]] • [[Camellia (cipher)]] [[Talk:Camellia (cipher)| ]] • [[CAPICOM]] [[Talk:CAPICOM| ]] • [[Capstone (cryptography)]] [[Talk:Capstone (cryptography)| ]] • [[Cardan grille]] [[Talk:Cardan grille| ]] • [[Card catalog (cryptology)]] [[Talk:Card catalog (cryptology)| ]] • [[Carlisle Adams]] [[Talk:Carlisle Adams| ]] • [[CAST-128]] [[Talk:CAST-128| ]] • [[CAST-256]] [[Talk:CAST-256| ]] • [[Cayley–Purser algorithm]] [[Talk:Cayley–Purser algorithm| ]] • [[CBC-MAC]] [[Talk:CBC-MAC| ]] • [[CCM mode]] [[Talk:CCM mode| ]] • [[CCMP (cryptography)|CCMP]] [[Talk:CCMP (cryptography)| ]] • [[CD-57]] [[Talk:CD-57| ]] • [[CDMF]] [[Talk:CDMF| ]] • [[Cellular Message Encryption Algorithm]] [[Talk:Cellular Message Encryption Algorithm| ]] • [[Centiban]] [[Talk:Centiban| ]] • [[Central Security Service]] [[Talk:Central Security Service| ]] • [[Centre for Applied Cryptographic Research]] [[Talk:Centre for Applied Cryptographic Research| ]] • [[Central Bureau]] [[Talk:Central Bureau| ]] • [[Certicom]] [[Talk:Certicom| ]] • [[Certificate authority]] [[Talk:Certificate authority| ]] • [[Certificate-based encryption]] [[Talk:Certificate-based encryption| ]] • [[Certificateless cryptography]] [[Talk:Certificateless cryptography| ]] • [[Certificate revocation list]] [[Talk:Certificate revocation list| ]] • [[Certificate signing request]] [[Talk:Certificate signing request| ]] • [[Certification path validation algorithm]] [[Talk:Certification path validation algorithm| ]] • [[Chaffing and winnowing]] [[Talk:Chaffing and winnowing| ]] • [[Challenge-Handshake Authentication Protocol]] [[Talk:Challenge-Handshake Authentication Protocol| ]] • [[Challenge–response authentication]] [[Talk:Challenge–response authentication| ]] • [[Chosen-ciphertext attack]] [[Talk:Chosen-ciphertext attack| ]] • [[Chosen-plaintext attack]] [[Talk:Chosen-plaintext attack| ]] • [[CIKS-1]] [[Talk:CIKS-1| ]] • [[Cipher disk]] [[Talk:Cipher disk| ]] • [[Cipher runes]] [[Talk:Cipher runes| ]] • [[Cipher security summary]] [[Talk:Cipher security summary| ]] • [[CipherSaber]] [[Talk:CipherSaber| ]] • [[Ciphertext expansion]] [[Talk:Ciphertext expansion| ]] • [[Ciphertext indistinguishability]] [[Talk:Ciphertext indistinguishability| ]] • [[Ciphertext-only attack]] [[Talk:Ciphertext-only attack| ]] • [[Ciphertext stealing]] [[Talk:Ciphertext stealing| ]] • [[CIPHERUNICORN-A]] [[Talk:CIPHERUNICORN-A| ]] • [[CIPHERUNICORN-E]] [[Talk:CIPHERUNICORN-E| ]] • [[Classical cipher]] [[Talk:Classical cipher| ]] • [[Claude Shannon]] [[Talk:Claude Shannon| ]] • [[Claw-free permutation]] [[Talk:Claw-free permutation| ]] • [[Cleartext]] [[Talk:Cleartext| ]] • [[CLEFIA]] [[Talk:CLEFIA| ]] • [[Clifford Cocks]] [[Talk:Clifford Cocks| ]] • [[Clipper chip]] [[Talk:Clipper chip| ]] • [[Clock (cryptography)]] [[Talk:Clock (cryptography)| ]] • [[Clock drift]] [[Talk:Clock drift| ]] • [[CMVP]] [[Talk:CMVP| ]] • [[COCONUT98]] [[Talk:COCONUT98| ]] • [[Codebook]] [[Talk:Codebook| ]] • [[Code (cryptography)]] [[Talk:Code (cryptography)| ]] • [[Code talker]] [[Talk:Code talker| ]] • [[Codress message]] [[Talk:Codress message| ]] • [[Cold boot attack]] [[Talk:Cold boot attack| ]] • [[Collision attack]] [[Talk:Collision attack| ]] • [[Collision resistance]] [[Talk:Collision resistance| ]] • [[Colossus computer]] [[Talk:Colossus computer| ]] • [[Combined Cipher Machine]] [[Talk:Combined Cipher Machine| ]] • [[Commitment scheme]] [[Talk:Commitment scheme| ]] • [[Common Scrambling Algorithm]] [[Talk:Common Scrambling Algorithm| ]] • [[Communications security]] [[Talk:Communications security| ]] • [[Communications Security Establishment]] [[Talk:Communications Security Establishment| ]] • [[Communication Theory of Secrecy Systems]] [[Talk:Communication Theory of Secrecy Systems| ]] • [[Comparison of disk encryption software]] [[Talk:Comparison of disk encryption software| ]] • [[Comparison of SSH clients]] [[Talk:Comparison of SSH clients| ]] • [[Completeness (cryptography)]] [[Talk:Completeness (cryptography)| ]] • [[Complexity trap]] [[Talk:Complexity trap| ]] • [[Computational Diffie–Hellman assumption]] [[Talk:Computational Diffie–Hellman assumption| ]] • [[Computational hardness assumption]] [[Talk:Computational hardness assumption| ]] • [[Computer insecurity]] [[Talk:Computer insecurity| ]] • [[Computer and network surveillance]] [[Talk:Computer and network surveillance| ]] • [[COMSEC equipment]] [[Talk:COMSEC equipment| ]] • [[Conch (SSH)]] [[Talk:Conch (SSH)| ]] • [[Concrete security]] [[Talk:Concrete security| ]] • [[Conel Hugh O'Donel Alexander]] [[Talk:Conel Hugh O'Donel Alexander| ]] • [[Confidentiality]] [[Talk:Confidentiality| ]] • [[Confusion and diffusion]] [[Talk:Confusion and diffusion| ]] • [[Content-scrambling system]] [[Talk:Content-scrambling system| ]] • [[Controlled Cryptographic Item]] [[Talk:Controlled Cryptographic Item| ]] • [[Corkscrew (program)]] [[Talk:Corkscrew (program)| ]] • [[Correlation immunity]] [[Talk:Correlation immunity| ]] • [[COSIC]] [[Talk:COSIC| ]] • [[Covert channel]] [[Talk:Covert channel| ]] • [[Cover (telecommunications)]] [[Talk:Cover (telecommunications)| ]] • [[Crab (cipher)]] [[Talk:Crab (cipher)| ]] • [[Cramer–Shoup cryptosystem]] [[Talk:Cramer–Shoup cryptosystem| ]] • [[CRAM-MD5]] [[Talk:CRAM-MD5| ]] • [[CRHF]] [[Talk:CRHF| ]] • [[Crib (cryptanalysis)]] [[Talk:Crib (cryptanalysis)| ]] • [[Crowds (anonymity network)]] [[Talk:Crowds (anonymity network) | ]] • [[Crypt (C)]] [[Talk:Crypt (C)| ]] • [[Cryptanalysis]] [[Talk:Cryptanalysis| ]] • [[Cryptanalysis of the Enigma]] [[Talk:Cryptanalysis of the Enigma| ]] • [[Cryptanalysis of the Lorenz cipher]] [[Talk:Cryptanalysis of the Lorenz cipher| ]] • [[Cryptanalytic computer]] [[Talk:Cryptanalytic computer| ]] • [[Cryptex]] [[Talk:Cryptex| ]] • [[Cryptico]] [[Talk:Cryptico| ]] • [[Crypto AG]] [[Talk:Crypto AG| ]] • [[Crypto-anarchism]] [[Talk:Crypto-anarchism| ]] • [[Crypto API (Linux)]] [[Talk:CryptoAPI| ]] • [[Microsoft CryptoAPI]] [[Talk:Crypto API| ]] • [[CryptoBuddy]] [[Talk:CryptoBuddy| ]] • [[Cryptochannel]] [[Talk:Cryptochannel| ]] • [[CRYPTO (conference)]] [[Talk:CRYPTO (conference)| ]] • [[Cryptogram]] [[Talk:Cryptogram| ]] • [[Cryptographically Generated Address]] [[Talk:Cryptographically Generated Address| ]] • [[Cryptographically secure pseudorandom number generator]] [[Talk:Cryptographically secure pseudorandom number generator| ]] • [[Cryptographically strong]] [[Talk:Cryptographically strong| ]] • [[Cryptographic Application Programming Interface]] [[Talk:Cryptographic Application Programming Interface| ]] • [[Cryptographic hash function]] [[Talk:Cryptographic hash function| ]] • [[Cryptographic key types]] [[Talk:Cryptographic key types| ]] • [[Cryptographic Message Syntax]] [[Talk:Cryptographic Message Syntax| ]] • [[Cryptographic primitive]] [[Talk:Cryptographic primitive| ]] • [[Cryptographic protocol]] [[Talk:Cryptographic protocol| ]] • [[Cryptographic Service Provider]] [[Talk:Cryptographic Service Provider| ]] • [[Cryptographie indéchiffrable]] [[Talk:Cryptographie indéchiffrable| ]] • [[Cryptography]] [[Talk:Cryptography| ]] • [[Cryptography in Japan]] [[Talk:Cryptography in Japan| ]] • [[Cryptography newsgroups]] [[Talk:Cryptography newsgroups| ]] • [[Cryptography standards]] [[Talk:Cryptography standards| ]] • [[Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age]] [[Talk:Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age| ]] • [[Cryptologia]] [[Talk:Cryptologia| ]] • [[Cryptology ePrint Archive]] [[Talk:Cryptology ePrint Archive| ]] • [[Cryptology Research Society of India]] [[Talk:Cryptology Research Society of India| ]] • [[Cryptomathic]] [[Talk:Cryptomathic| ]] • [[Cryptome]] [[Talk:Cryptome| ]] • [[Cryptomeria cipher]] [[Talk:Cryptomeria cipher| ]] • [[Cryptonomicon]] [[Talk:Cryptonomicon| ]] • [[CrypTool]] [[Talk:CrypTool| ]] • [[Crypto phone]] [[Talk:Crypto phone| ]] • [[Crypto-society]] [[Talk:Crypto-society| ]] • [[Cryptosystem]] [[Talk:Cryptosystem| ]] • [[Cryptovirology]] [[Talk:Cryptovirology| ]] • [[CRYPTREC]] [[Talk:CRYPTREC| ]] • [[CS-Cipher]] [[Talk:CS-Cipher| ]] • [[Curve25519]] [[Talk:Curve25519| ]] • [[Curve448]] [[Talk:Curve448| ]] • [[Custom hardware attack]] [[Talk:Custom hardware attack| ]] • [[Cycles per byte]] [[Talk:Cycles per byte| ]] • [[Cyclometer]] [[Talk:Cyclometer| ]] • [[Cypherpunk]] [[Talk:Cypherpunk| ]] • [[Cyrillic Projector]] [[Talk:Cyrillic Projector| ]] ==D== [[D'Agapeyeff cipher]] [[Talk:D'Agapeyeff cipher| ]] • [[Daniel J. Bernstein]] [[Talk:Daniel J. Bernstein| ]] • [[Data Authentication Algorithm]] [[Talk:Data Authentication Algorithm| ]] • [[Data Encryption Standard]] [[Talk:Data Encryption Standard| ]] • [[Datagram Transport Layer Security]] [[Talk:Datagram Transport Layer Security| ]] • [[David Chaum]] [[Talk:David Chaum| ]] • [[David Kahn (writer)|David Kahn]] [[Talk:David Kahn| ]] • [[David Naccache]] [[Talk:David Naccache| ]] • [[David A. Wagner|David Wagner]] [[Talk:David Wagner| ]] • [[David Wheeler (computer scientist)]] [[Talk:David Wheeler (computer scientist)| ]] • [[Davies attack]] [[Talk:Davies attack| ]] • [[Davies–Meyer hash]] [[Talk:Davies–Meyer hash| ]] • [[DEAL]] [[Talk:DEAL| ]] • [[Decipherment]] [[Talk:Decipherment| ]] • [[Decisional Diffie–Hellman assumption]] [[Talk:Decisional Diffie–Hellman assumption| ]] • [[Decorrelation theory]] [[Talk:Decorrelation theory| ]] • [[Decrypt]] [[Talk:Decrypt| ]] • [[DeCSS]] [[Talk:DeCSS| ]] • [[Defence Signals Directorate]] [[Talk:Defence Signals Directorate| ]] • [[Degree of anonymity]] [[Talk:Degree of anonymity| ]] • [[Delegated Path Discovery]] [[Talk:Delegated Path Discovery| ]] • [[Delegated Path Validation]] [[Talk:Delegated Path Validation| ]] • [[Deniable encryption]] [[Talk:Deniable encryption| ]] • [[Derek Taunt]] [[Talk:Derek Taunt| ]] • [[Derived unique key per transaction]] [[Talk:Derived unique key per transaction| ]] • [[DES Challenges]] [[Talk:DES Challenges| ]] • [[DES supplementary material]] [[Talk:DES supplementary material| ]] • [[DES-X]] [[Talk:DES-X| ]] • [[Deterministic encryption]] [[Talk:Deterministic encryption| ]] • [[DFC (cipher)]] [[Talk:DFC (cipher)| ]] • [[Dictionary attack]] [[Talk:Dictionary attack| ]] • [[Differential cryptanalysis]] [[Talk:Differential cryptanalysis| ]] • [[Differential-linear attack]] [[Talk:Differential-linear attack| ]] • [[Differential power analysis]] [[Talk:Differential power analysis| ]] • [[Diffie–Hellman key exchange]] [[Talk:Diffie–Hellman key exchange| ]] • [[Diffie–Hellman problem]] [[Talk:Diffie–Hellman problem| ]] • [[DigiCipher 2]] [[Talk:DigiCipher 2| ]] • [[Digital Fortress]] [[Talk:Digital Fortress| ]] • [[Digital rights management]] [[Talk:Digital rights management| ]] • [[Digital signature]] [[Talk:Digital signature| ]] • [[Digital Signature Algorithm]] [[Talk:Digital Signature Algorithm| ]] • [[Digital signature forgery]] [[Talk:Digital signature forgery| ]] • [[Digital timestamping]] [[Talk:Digital timestamping| ]] • [[Digital watermarking]] [[Talk:Digital watermarking| ]] • [[Dilly Knox]] [[Talk:Dilly Knox| ]] • [[Dining cryptographers problem]] [[Talk:Dining cryptographers problem| ]] • [[Diplomatic bag]] [[Talk:Diplomatic bag| ]] • [[Direct Anonymous Attestation]] [[Talk:Direct Anonymous Attestation| ]] • [[Discrete logarithm]] [[Talk:Discrete logarithm| ]] • [[Disk encryption]] [[Talk:Disk encryption| ]] • [[Disk encryption hardware]] [[Talk:Disk encryption hardware| ]] • [[Disk encryption software]] [[Talk:Disk encryption software| ]] • [[Distance-bounding protocol]] [[Talk:Distance-bounding protocol| ]] • [[Distinguishing attack]] [[Talk:Distinguishing attack| ]] • [[Distributed.net]] [[Talk:Distributed.net| ]] • [[DMA attack]] [[Talk:DMA attack| ]] • [[dm-crypt]] [[Talk:dm-crypt| ]] • [[Dmitry Sklyarov]] [[Talk:Dmitry Sklyarov| ]] • [[DomainKeys]] [[Talk:DomainKeys| ]] • [[Don Coppersmith]] [[Talk:Don Coppersmith| ]] • [[Dorabella Cipher]] [[Talk:Dorabella Cipher| ]] • [[Double Ratchet Algorithm]] [[Talk:Double Ratchet Algorithm| ]] • [[Doug Stinson]] [[Talk:Doug Stinson| ]] • [[Dragon (cipher)]] [[Talk:Dragon (cipher)| ]] • [[DRYAD]] [[Talk:DRYAD| ]] • [[Dual_EC_DRBG]] [[Talk:Dual EC DRBG| ]] • ==E== [[E0 (cipher)]] [[Talk:E0 (cipher)| ]] • [[E2 (cipher)]] [[Talk:E2 (cipher)| ]] • [[E4M]] [[Talk:E4M| ]] • [[EAP-AKA]] [[Talk:EAP-AKA| ]] • [[EAP-SIM]] [[Talk:EAP-SIM| ]] • [[EAX mode]] [[Talk:EAX mode| ]] • [[ECC patents]] [[Talk:ECC patents| ]] • [[ECHELON]] [[Talk:ECHELON| ]] • [[ECRYPT]] [[Talk:ECRYPT| ]] • [[Edouard Fleissner von Wostrowitz]] [[Talk:Edouard Fleissner von Wostrowitz| ]] • [[Edward Hebern]] [[Talk:Edward Hebern| ]] • [[Edward Scheidt]] [[Talk:Edward Scheidt| ]] • [[Edward Travis]] [[Talk:Edward Travis| ]] • [[EFF DES cracker]] [[Talk:EFF DES cracker| ]] • [[Efficient Probabilistic Public-Key Encryption Scheme]] [[Talk:Efficient Probabilistic Public-Key Encryption Scheme| ]] • [[EKMS]] [[Talk:EKMS| ]] • [[Electronic Communications Act 2000]] [[Talk:Electronic Communications Act 2000| ]] • [[Electronic money]] [[Talk:Electronic money| ]] • [[Electronic signature]] [[Talk:Electronic signature| ]] • [[Electronic voting]] [[Talk:Electronic voting| ]] • [[ElGamal encryption]] [[Talk:ElGamal encryption| ]] • [[ElGamal signature scheme]] [[Talk:ElGamal signature scheme| ]] • [[Eli Biham]] [[Talk:Eli Biham| ]] • [[Elizebeth Friedman]] [[Talk:Elizebeth Friedman| ]] • [[Elliptic-curve cryptography]] [[Talk:Elliptic-curve cryptography| ]] • [[Elliptic-curve Diffie–Hellman]] [[Talk:Elliptic-curve Diffie–Hellman| ]] • [[Elliptic Curve DSA]] [[Talk:Elliptic Curve DSA| ]] • [[EdDSA]] [[Talk:EdDSA| ]] • [[Elliptic curve only hash]] [[Talk:Elliptic curve only hash| ]] • [[Elonka Dunin]] [[Talk:Elonka Dunin| ]] • [[Encrypted function]] [[Talk:Encrypted function| ]] • [[Encrypted key exchange]] [[Talk:Encrypted key exchange| ]] • [[Encrypting File System]] [[Talk:Encrypting File System| ]] • [[Encryption]] [[Talk:Encryption| ]] • [[Encryption software]] [[Talk:Encryption software| ]] • [[Enigmail]] [[Talk:Enigmail| ]] • [[Enigma machine]] [[Talk:Enigma machine| ]] • [[Enigma rotor details]] [[Talk:Enigma rotor details| ]] • [[Entrust]] [[Talk:Entrust| ]] • [[Ernst Fetterlein]] [[Talk:Ernst Fetterlein| ]] • [[eSTREAM]] [[Talk:eSTREAM| ]] • [[Étienne Bazeries]] [[Talk:Étienne Bazeries| ]] • [[Eurocrypt]] [[Talk:Eurocrypt| ]] • [[EuroCrypt]] [[Talk:EuroCrypt| ]] • [[Export of cryptography]] [[Talk:Export of cryptography| ]] • [[Extensible Authentication Protocol]] [[Talk:Extensible Authentication Protocol| ]] ==F== [[Fast Software Encryption]] [[Talk:Fast Software Encryption| ]] • [[Fast syndrome-based hash]] [[Talk:Fast syndrome-based hash| ]] • [[FEA-M]] [[Talk:FEA-M| ]] • [[FEAL]] [[Talk:FEAL| ]] • [[Feige–Fiat–Shamir identification scheme]] [[Talk:Feige–Fiat–Shamir identification scheme| ]] • [[Feistel cipher]] [[Talk:Feistel cipher| ]] • [[Félix Delastelle]] [[Talk:Félix Delastelle| ]] • [[Fialka]] [[Talk:Fialka| ]] • [[Filesystem-level encryption]] [[Talk:Filesystem-level encryption| ]] • [[FileVault]] [[Talk:FileVault| ]] • [[Fill device]] [[Talk:Fill device| ]] • [[Financial cryptography]] [[Talk:Financial cryptography| ]] • [[FIPS 140]] [[Talk:FIPS 140| ]] • [[FIPS 140-2]] [[Talk:FIPS 140-2| ]] • [[Firefly (key exchange protocol)]] [[Talk:Firefly (key exchange protocol)| ]] • [[FISH (cipher)]] [[Talk:FISH (cipher)| ]] • [[Fish (cryptography)]] [[Talk:Fish (cryptography)| ]] • [[Floradora]] [[Talk:Floradora| ]] • [[Fluhrer, Mantin and Shamir attack]] [[Talk:Fluhrer, Mantin and Shamir attack| ]] • [[Format-preserving encryption]] [[Talk:Format-preserving encryption| ]] • [[Fortezza]] [[Talk:Fortezza| ]] • [[Fort George G. Meade]] [[Talk:Fort George G. Meade| ]] • [[Fortuna (PRNG)]] [[Talk:Fortuna (PRNG)| ]] • [[Four-square cipher]] [[Talk:Four-square cipher| ]] • [[Franciszek Pokorny]] [[Talk:Franciszek Pokorny| ]] • [[Frank A. Stevenson]] [[Talk:Frank A. Stevenson| ]] • [[Frank Rowlett]] [[Talk:Frank Rowlett| ]] • [[Freenet]] [[Talk:Freenet| ]] • [[FreeOTFE]] [[Talk:FreeOTFE| ]] • [[FreeS/WAN]] [[Talk:FreeS/WAN| ]] • [[Frequency analysis]] [[Talk:Frequency analysis| ]] • [[Friedrich Kasiski]] [[Talk:Friedrich Kasiski| ]] • [[Fritz-chip]] [[Talk:Fritz-chip| ]] • [[FROG]] [[Talk:FROG| ]] • [[FROSTBURG]] [[Talk:FROSTBURG| ]] • [[FTP over SSH]] [[Talk:FTP over SSH| ]] • [[Full disk encryption]] [[Talk:Full disk encryption| ]] • [[Full Domain Hash]] [[Talk:Full Domain Hash| ]] • [[F. W. Winterbotham]] [[Talk:F. W. Winterbotham| ]] ==G== [[Galois/Counter Mode]] [[Talk:Galois/Counter Mode| ]] • [[Gardening (cryptanalysis)]] [[Talk:Gardening (cryptanalysis)| ]] • [[GCHQ Bude]] [[Talk:GCHQ Bude| ]] • [[GCHQ CSO Morwenstow]] [[Talk:GCHQ CSO Morwenstow| ]] • [[GDES]] [[Talk:GDES| ]] • [[Generic Security Services Application Program Interface]] [[Talk:Generic Security Services Application Program Interface| ]] • [[George Blakley]] [[Talk:George Blakley| ]] • [[George Scovell]] [[Talk:George Scovell| ]] • [[GGH encryption scheme]] [[Talk:GGH encryption scheme| ]] • [[GGH signature scheme]] [[Talk:GGH signature scheme| ]] • [[Gilbert Vernam]] [[Talk:Gilbert Vernam| ]] • [[GMR (cryptography)]] [[Talk:GMR (cryptography)| ]] • [[GNU Privacy Guard]] [[Talk:GNU Privacy Guard| ]] • [[GnuTLS]] [[Talk:GnuTLS| ]] • [[Goldwasser–Micali cryptosystem]] [[Talk:Goldwasser–Micali cryptosystem| ]] • [[Gordon Welchman]] [[Talk:Gordon Welchman| ]] • [[GOST (block cipher)]] [[Talk:GOST (block cipher)| ]] • [[GOST (hash function)]] [[Talk:GOST (hash function)| ]] • [[Government Communications Headquarters]] [[Talk:Government Communications Headquarters| ]] • [[Government Communications Security Bureau]] [[Talk:Government Communications Security Bureau| ]] • [[Grain (cipher)]] [[Talk:Grain (cipher)| ]] • [[Grand Cru (cipher)]] [[Talk:Grand Cru (cipher)| ]] • [[Great Cipher]] [[Talk:Great Cipher| ]] • [[Grill (cryptology)]] [[Talk:Grill (cryptology)| ]] • [[Grille (cryptography)]] [[Talk:Grille (cryptography)| ]] • [[Group-based cryptography]] [[Talk:Group-based cryptography| ]] • [[Group signature]] [[Talk:Group signature| ]] • [[Grover's algorithm]] [[Talk:Grover's algorithm| ]] • [[Gustave Bertrand]] [[Talk:Gustave Bertrand| ]] • [[Gwido Langer]] [[Talk:Gwido Langer| ]] ==H== [[H.235]] [[Talk:H.235| ]] • [[HAIFA construction]] [[Talk:HAIFA construction| ]] • [[HAIPE]] [[Talk:HAIPE| ]] • [[Hans Dobbertin]] [[Talk:Hans Dobbertin| ]] • [[Hans-Thilo Schmidt]] [[Talk:Hans-Thilo Schmidt| ]] • [[Hard-core predicate]] [[Talk:Hard-core predicate| ]] • [[Hardware random number generator]] [[Talk:Hardware random number generator| ]] • [[Hardware security module]] [[Talk:Hardware security module| ]] • [[Harold Keen]] [[Talk:Harold Keen| ]] • [[Harry Hinsley]] [[Talk:Harry Hinsley| ]] • [[Harvest (computer)]] [[Talk:Harvest (computer)| ]] • [[HAS-160]] [[Talk:HAS-160| ]] • [[Hash-based cryptography]] [[Talk:Hash-based cryptography| ]] • [[Hashcash]] [[Talk:Hashcash| ]] • [[Hash chain]] [[Talk:Hash chain| ]] • [[Hash function security summary]] [[Talk:Hash function security summary| ]] • [[Hash list]] [[Talk:Hash list| ]] • [[Hasty Pudding cipher]] [[Talk:Hasty Pudding cipher| ]] • [[HAVAL]] [[Talk:HAVAL| ]] • [[HC-256]] [[Talk:HC-256| ]] • [[HC-9]] [[Talk:HC-9| ]] • [[Heath Robinson (codebreaking machine)]] [[Talk:Heath Robinson (codebreaking machine)| ]] • [[Hebern rotor machine]] [[Talk:Hebern rotor machine| ]] • [[Henri Braquenié]] [[Talk:Henri Braquenié| ]] • [[Henryk Zygalski]] [[Talk:Henryk Zygalski| ]] • [[Herbert Yardley]] [[Talk:Herbert Yardley| ]] • [[Hidden Field Equations]] [[Talk:Hidden Field Equations| ]] • [[Hideki Imai]] [[Talk:Hideki Imai| ]] • [[Hierocrypt]] [[Talk:Hierocrypt| ]] • [[High-bandwidth Digital Content Protection]] [[Talk:High-bandwidth Digital Content Protection| ]] • [[Higher-order differential cryptanalysis]] [[Talk:Higher-order differential cryptanalysis| ]] • [[Hill cipher]] [[Talk:Hill cipher| ]] • [[History of cryptography]] [[Talk:History of cryptography| ]] • [[HMAC]] [[Talk:HMAC| ]] • [[HMAC-based One-time Password algorithm]] [[Talk:HMAC-based One-time Password algorithm| ]] (HOTP) • [[Horst Feistel]] [[Talk:Horst Feistel| ]] • [[Howard Heys]] [[Talk:Howard Heys| ]] • [[Https]] [[Talk:Https| ]] • [[Hugo Hadwiger]] [[Talk:Hugo Hadwiger| ]] • [[Hugo Koch]] [[Talk:Hugo Koch| ]] • [[Hushmail]] [[Talk:Hushmail| ]] • [[Hut 6]] [[Talk:Hut 6| ]] • [[Hut 8]] [[Talk:Hut 8| ]] • [[HX-63]] [[Talk:HX-63| ]] • [[Hybrid cryptosystem]] [[Talk:Hybrid cryptosystem| ]] • [[Hyperelliptic curve cryptography]] [[Talk:Hyperelliptic curve cryptography| ]] • [[Hyper-encryption]] [[Talk:Hyper-encryption| ]] ==I== [[Ian Goldberg]] [[Talk:Ian Goldberg| ]] • [[IBM 4758]] [[Talk:IBM 4758| ]] • [[ICE (cipher)]] [[Talk:ICE (cipher)| ]] • [[ID-based cryptography]] [[Talk:ID-based cryptography| ]] • [[IDEA NXT]] [[Talk:IDEA NXT| ]] • [[Identification friend or foe]] [[Talk:Identification friend or foe| ]] • [[IEEE 802.11i]] [[Talk:IEEE 802.11i| ]] • [[IEEE P1363]] [[Talk:IEEE P1363| ]] • [[I. J. Good]] [[Talk:I. J. Good| ]] • [[Illegal prime]] [[Talk:Illegal prime| ]] • [[Impossible differential cryptanalysis]] [[Talk:Impossible differential cryptanalysis| ]] • [[Index of coincidence]] [[Talk:Index of coincidence| ]] • [[Indifferent chosen-ciphertext attack]] [[Talk:Indifferent chosen-ciphertext attack| ]] • [[Indistinguishability obfuscation]] [[Talk:Indistinguishability obfuscation| ]] • [[Indocrypt]] [[Talk:Indocrypt| ]] • [[Information leakage]] [[Talk:Information leakage| ]] • [[Information Security Group]] [[Talk:Information Security Group| ]] • [[Information-theoretic security]] [[Talk:Information-theoretic security| ]] • [[Initialization vector]] [[Talk:Initialization vector| ]] • [[Integer factorization]] [[Talk:Integer factorization| ]] • [[Integral cryptanalysis]] [[Talk:Integral cryptanalysis| ]] • [[Integrated Encryption Scheme]] [[Talk:Integrated Encryption Scheme| ]] • [[Integrated Windows Authentication]] [[Talk:Integrated Windows Authentication| ]] • [[Interlock protocol]] [[Talk:Interlock protocol| ]] • [[Intermediate certificate authorities]] [[Talk:Intermediate certificate authorities| ]] • [[International Association for Cryptologic Research]] [[Talk:International Association for Cryptologic Research| ]] • [[International Data Encryption Algorithm]] [[Talk:International Data Encryption Algorithm| ]] • [[Internet Key Exchange]] [[Talk:Internet Key Exchange| ]] • [[Internet Security Association and Key Management Protocol]] [[Talk:Internet Security Association and Key Management Protocol| ]] • [[Interpolation attack]] [[Talk:Interpolation attack| ]] • [[Invisible ink]] [[Talk:Invisible ink| ]] • [[IPsec]] [[Talk:IPsec| ]] • [[Iraqi block cipher]] [[Talk:Iraqi block cipher| ]] • [[ISAAC (cipher)]] [[Talk:ISAAC (cipher)| ]] • [[ISO 19092-2]] [[Talk:ISO 19092-2| ]] • [[ISO/IEC 9797]] [[Talk:ISO/IEC 9797| ]] • [[Ivan Damgård]] [[Talk:Ivan Damgård| ]] ==J== [[Jacques Stern]] [[Talk:Jacques Stern| ]] • [[JADE (cypher machine)]] [[Talk:JADE (cypher machine)| ]] • [[James Gillogly]] [[Talk:James Gillogly| ]] • [[James H. Ellis]] [[Talk:James H. Ellis| ]] • [[James Massey]] [[Talk:James Massey| ]] • [[Jan Graliński]] [[Talk:Jan Graliński| ]] • [[Jan Kowalewski]] [[Talk:Jan Kowalewski| ]] • [[Japanese naval codes]] [[Talk:Japanese naval codes| ]] • [[Java Cryptography Architecture]] [[Talk:Java Cryptography Architecture| ]] • [[Jefferson disk]] [[Talk:Jefferson disk| ]] • [[Jennifer Seberry]] [[Talk:Jennifer Seberry| ]] • [[Jerzy Różycki]] [[Talk:Jerzy Różycki| ]] • [[Joan Daemen]] [[Talk:Joan Daemen| ]] • [[Johannes Trithemius]] [[Talk:Johannes Trithemius| ]] • [[John Herivel]] [[Talk:John Herivel| ]] • [[John Kelsey (cryptanalyst)]] [[Talk:John Kelsey (cryptanalyst)| ]] • [[John R. F. Jeffreys]] [[Talk:John R. F. Jeffreys| ]] • [[John Tiltman]] [[Talk:John Tiltman| ]] • [[Jon Lech Johansen]] [[Talk:Jon Lech Johansen| ]] • [[Josef Pieprzyk]] [[Talk:Josef Pieprzyk| ]] • [[Joseph Desch]] [[Talk:Joseph Desch| ]] • [[Joseph Finnegan (cryptographer)]] [[Talk:Joseph Finnegan (cryptographer)| ]] • [[Joseph Mauborgne]] [[Talk:Joseph Mauborgne| ]] • [[Joseph Rochefort]] [[Talk:Joseph Rochefort| ]] • [[Journal of Cryptology]] [[Talk:Journal of Cryptology| ]] • [[Junger v. Daley]] [[Talk:Junger v. Daley| ]] ==K== [[Kaisa Nyberg]] [[Talk:Kaisa Nyberg| ]] • [[Kalyna (cipher)]] [[Talk:Kalyna (cipher)| ]] • [[Kasiski examination]] [[Talk:Kasiski examination| ]] • [[KASUMI]] [[Talk:KASUMI| ]] • [[KCDSA]] [[Talk:KCDSA| ]] • [[KeePass]] [[Talk:KeePass| ]] • [[Kerberos (protocol)]] [[Talk:Kerberos (protocol)| ]] • [[Kerckhoffs's principle]] [[Talk:Kerckhoffs's principle| ]] • [[Kevin McCurley (cryptographer)]] [[Talk:Kevin McCurley| ]] • [[Key-agreement protocol]] [[Talk:Key-agreement protocol| ]] • [[Key authentication]] [[Talk:Key authentication| ]] • [[Key clustering]] [[Talk:Key clustering| ]] • [[Key (cryptography)]] [[Talk:Key (cryptography)| ]] • [[Key derivation function]] [[Talk:Key derivation function| ]] • [[Key distribution center]] [[Talk:Key distribution center| ]] • [[Key escrow]] [[Talk:Key escrow| ]] • [[Key exchange]] [[Talk:Key exchange| ]] • [[Keyfile]] [[Talk:Keyfile| ]] • [[Key generation]] [[Talk:Key generation| ]] • [[Key generator]] [[Talk:Key generator| ]] • [[Key management]] [[Talk:Key management| ]] • [[Key-recovery attack]] [[Talk:Key-recovery attack| ]] • [[Key schedule]] [[Talk:Key schedule| ]] • [[Key server (cryptographic)]] [[Talk:Key server (cryptographic)| ]] • [[Key signature (cryptography)]] [[Talk:Key signature (cryptography)| ]] • [[Keysigning]] [[Talk:Keysigning| ]] • [[Key signing party]] [[Talk:Key signing party| ]] • [[Key size]] [[Talk:Key size| ]] • [[Key space (cryptography)]] [[Talk:Key space| ]] • [[Keystream]] [[Talk:Keystream| ]] • [[Key stretching]] [[Talk:Key stretching| ]] • [[Key whitening]] [[Talk:Key whitening| ]] • [[KG-84]] [[Talk:KG-84| ]] • [[KHAZAD]] [[Talk:KHAZAD| ]] • [[Khufu and Khafre]] [[Talk:Khufu and Khafre| ]] • [[Kiss (cryptanalysis)]] [[Talk:Kiss (cryptanalysis)| ]] • [[KL-43]] [[Talk:KL-43| ]] • [[KL-51]] [[Talk:KL-51| ]] • [[KL-7]] [[Talk:KL-7| ]] • [[Kleptography]] [[Talk:Kleptography| ]] • [[KN-Cipher]] [[Talk:KN-Cipher| ]] • [[Knapsack problem]] [[Talk:Knapsack problem| ]] • [[Known-key distinguishing attack]] [[Talk:Known-key distinguishing attack| ]] • [[Known-plaintext attack]] [[Talk:Known-plaintext attack| ]] • [[KnownSafe]] [[Talk:KnownSafe| ]] • [[KOI-18]] [[Talk:KOI-18| ]] • [[KOV-14]] [[Talk:KOV-14| ]] • [[Kryha]] [[Talk:Kryha| ]] • [[Kryptos]] [[Talk:Kryptos| ]] • [[KSD-64]] [[Talk:KSD-64| ]] • [[Kupyna]] [[Talk:Kupyna| ]] • [[Kuznyechik]] [[Talk:Kuznyechik| ]] • [[KW-26]] [[Talk:KW-26| ]] • [[KW-37]] [[Talk:KW-37| ]] • [[KY-3]] [[Talk:KY-3| ]] • KY-57 [[Talk:KY-57| ]] • [[KY-58]] [[Talk:KY-58| ]] • [[KY-68]] [[Talk:KY-68| ]] • [[KYK-13]] [[Talk:KYK-13| ]] ==L== [[Lacida]] [[Talk:Lacida| ]] • [[Ladder-DES]] [[Talk:Ladder-DES| ]] • [[Lamport signature]] [[Talk:Lamport signature| ]] • [[Lars Knudsen]] [[Talk:Lars Knudsen| ]] • [[Lattice-based cryptography]] [[Talk:Lattice-based cryptography| ]] • [[Laurance Safford]] [[Talk:Laurance Safford| ]] • [[Lawrie Brown]] [[Talk:Lawrie Brown| ]] • [[LCS35]] [[Talk:LCS35| ]] • [[Leo Marks]] [[Talk:Leo Marks| ]] • [[Leonard Adleman]] [[Talk:Leonard Adleman| ]] • [[Leon Battista Alberti]] [[Talk:Leon Battista Alberti| ]] • [[Leo Rosen]] [[Talk:Leo Rosen| ]] • [[Leslie Yoxall]] [[Talk:Leslie Yoxall| ]] • [[LEVIATHAN (cipher)]] [[Talk:LEVIATHAN (cipher)| ]] • [[LEX (cipher)]] [[Talk:LEX (cipher)| ]] • [[Libelle (cipher)]] [[Talk:Libelle (cipher)| ]] • [[Linear cryptanalysis]] [[Talk:Linear cryptanalysis| ]] • [[Linear-feedback shift register]] [[Talk:Linear feedback shift register| ]] • [[Link encryption]] [[Talk:Link encryption| ]] • [[List of ciphertexts]] [[Talk:List of ciphertexts| ]] • [[List of cryptographers]] [[Talk:List of cryptographers| ]] • [[List of cryptographic file systems]] [[Talk:List of cryptographic file systems| ]] • [[List of cryptographic key types]] [[Talk:List of cryptographic key types| ]] • List of cryptology conferences [[Talk:List of cryptology conferences| ]] • [[List of telecommunications encryption terms]] [[Talk:List of telecommunications encryption terms| ]] • [[List of people associated with Bletchley Park]] • [[Talk:List of people associated with Bletchley Park| ]] [[List of SFTP clients]] [[Talk:List of SFTP clients| ]] • [[List of SFTP server software]] [[Talk:List of SFTP server software| ]] • [[LOKI]] [[Talk:LOKI| ]] • [[LOKI97]] [[Talk:LOKI97| ]] • [[Lorenz cipher]] [[Talk:Lorenz cipher| ]] • [[Louis W. Tordella]] [[Talk:Louis W. Tordella| ]] • [[Lsh]] [[Talk:Lsh| ]] • [[Lucifer (cipher)]] [[Talk:Lucifer (cipher)| ]] • [[Lyra2]] [[Talk:Lyra2| ]] ==M== [[M6 (cipher)]] [[Talk:M6 (cipher)| ]] • [[M8 (cipher)]] [[Talk:M8 (cipher)| ]] • [[M-209]] [[Talk:M-209| ]] • [[M-325]] [[Talk:M-325| ]] • [[M-94]] [[Talk:M-94| ]] • [[MacGuffin (cipher)]] [[Talk:MacGuffin (cipher)| ]] • [[Madryga]] [[Talk:Madryga| ]] • [[MAGENTA]] [[Talk:MAGENTA| ]] • [[Magic (cryptography)]] [[Talk:Magic (cryptography)| ]] • [[Maksymilian Ciężki]] [[Talk:Maksymilian Ciężki| ]] • [[Malcolm J. Williamson]] [[Talk:Malcolm J. Williamson| ]] • [[Malleability (cryptography)]] [[Talk:Malleability (cryptography)| ]] • [[Man-in-the-middle attack]] [[Talk:Man-in-the-middle attack| ]] • [[Marian Rejewski]] [[Talk:Marian Rejewski| ]] • [[MARS (cryptography)]] [[Talk:MARS| ]] • [[Martin Hellman]] [[Talk:Martin Hellman| ]] • [[MaruTukku]] [[Talk:MaruTukku| ]] • [[Massey–Omura cryptosystem]] [[Talk:Massey–Omura cryptosystem| ]] • [[Matt Blaze]] [[Talk:Matt Blaze| ]] • [[Matt Robshaw]] [[Talk:Matt Robshaw| ]] • [[Max Newman]] [[Talk:Max Newman| ]] • [[McEliece cryptosystem]] [[Talk:McEliece cryptosystem| ]] • [[mcrypt]] [[Talk:mcrypt| ]] • [[MD2 (cryptography)]] [[Talk:MD2| ]] • [[MD4]] [[Talk:MD4| ]] • [[MD5]] [[Talk:MD5| ]] • [[MD5CRK]] [[Talk:MD5CRK| ]] • [[MDC-2]] [[Talk:MDC-2| ]] • [[MDS matrix]] [[Talk:MDS matrix| ]] • [[Mean shortest distance]] [[Talk:Mean shortest distance| ]] • [[Meet-in-the-middle attack]] [[Talk:Meet-in-the-middle attack| ]] • [[Mental poker]] [[Talk:Mental poker| ]] • [[Mercury (cipher machine)]] [[Talk:Mercury (cipher machine)| ]] • [[Mercy (cipher)]] [[Talk:Mercy (cipher)| ]] • [[Meredith Gardner]] [[Talk:Meredith Gardner| ]] • [[Merkle signature scheme]] [[Talk:Merkle signature scheme| ]] • [[Merkle–Damgård construction]] [[Talk:Merkle–Damgård construction| ]] • [[Merkle–Hellman knapsack cryptosystem]] [[Talk:Merkle–Hellman knapsack cryptosystem| ]] • [[Merkle's Puzzles]] [[Talk:Merkle's Puzzles| ]] • [[Merkle tree]] [[Talk:Merkle tree| ]] • [[MESH (cipher)]] [[Talk:MESH (cipher)| ]] • [[Message authentication]] [[Talk:Message authentication| ]] • [[Message authentication code]] [[Talk:Message authentication code| ]] • [[Message forgery]] [[Talk:Message forgery| ]] • [[MI8]] [[Talk:MI8| ]] • [[Michael Luby]] [[Talk:Michael Luby| ]] • [[MICKEY]] [[Talk:MICKEY| ]] • [[Microdot]] [[Talk:Microdot| ]] • [[Military Cryptanalysis (book) (William F. Friedman)]] [[Talk:Military Cryptanalysis (book) (William F. Friedman)| ]] • [[Military Cryptanalytics]] [[Talk:Military Cryptanalytics| ]] • [[Mimic function]] [[Talk:Mimic function| ]] • [[Mirror writing]] [[Talk:Mirror writing| ]] • [[MISTY1]] [[Talk:MISTY1| ]] • [[Mitsuru Matsui]] [[Talk:Mitsuru Matsui| ]] • [[MMB (cipher)]] [[Talk:MMB (cipher)| ]] • [[Mod n cryptanalysis]] [[Talk:Mod n cryptanalysis| ]] • [[MQV]] [[Talk:MQV| ]] • [[MS-CHAP]] [[Talk:MS-CHAP| ]] • [[MUGI]] [[Talk:MUGI| ]] • [[MULTI-S01]] [[Talk:MULTI-S01| ]] • [[MultiSwap]] [[Talk:MultiSwap| ]] • [[Multivariate cryptography]] [[Talk:Multivariate cryptography| ]] ==N== [[National Communications Centre]] [[Talk:National Communications Centre| ]] • [[National Cryptologic Museum]] [[Talk:National Cryptologic Museum| ]] • [[National Security Agency]] [[Talk:National Security Agency| ]] • [[National Cipher Challenge]] [[Talk:National Cipher Challenge| ]] • [[Navajo I]] [[Talk:Navajo I| ]] • [[Neal Koblitz]] [[Talk:Neal Koblitz| ]] • [[Needham–Schroeder protocol]] [[Talk:Needham–Schroeder protocol| ]] • [[Negligible function]] [[Talk:Negligible function| ]] • [[NEMA (machine)]] [[Talk:NEMA (machine)| ]] • [[NESSIE]] [[Talk:NESSIE| ]] • [[Network Security Services]] [[Talk:Network Security Services| ]] • [[Neural cryptography]] [[Talk:Neural cryptography| ]] • [[New Data Seal]] [[Talk:New Data Seal| ]] • [[NewDES]] [[Talk:NewDES| ]] • [[N-Hash]] [[Talk:N-Hash| ]] • [[Nicolas Courtois]] [[Talk:Nicolas Courtois| ]] • [[Niederreiter cryptosystem]] [[Talk:Niederreiter cryptosystem| ]] • [[Niels Ferguson]] [[Talk:Niels Ferguson| ]] • [[Nigel de Grey]] [[Talk:Nigel de Grey| ]] • [[Nihilist cipher]] [[Talk:Nihilist cipher| ]] • [[Nikita Borisov]] [[Talk:Nikita Borisov| ]] • [[Nimbus (cipher)]] [[Talk:Nimbus (cipher)| ]] • [[NIST hash function competition]] [[Talk:NIST hash function competition| ]] • [[Nonlinear-feedback shift register]] [[Talk:Nonlinear-feedback shift register| ]] • [[NOEKEON]] [[Talk:NOEKEON| ]] • [[Non-malleable codes]] [[Talk:Non-malleable codes| ]] • [[Noreen]] [[Talk:Noreen| ]] • [[Nothing up my sleeve number]] [[Talk:Nothing up my sleeve number| ]] • [[NSA cryptography]] [[Talk:NSA cryptography| ]] • [[NSA encryption systems]] [[Talk:NSA encryption systems| ]] • NSA in fiction [[Talk:NSA in fiction| ]] • [[NSAKEY]] [[Talk:NSAKEY| ]] • [[NSA Suite A Cryptography]] [[Talk:NSA Suite A Cryptography| ]] • [[NSA Suite B Cryptography]] [[Talk:NSA Suite B Cryptography| ]] • [[NT LAN Manager]] [[Talk:NT LAN Manager| ]] • [[NTLMSSP]] [[Talk:NTLMSSP| ]] • [[NTRUEncrypt]] [[Talk:NTRUEncrypt| ]] • [[NTRUSign]] [[Talk:NTRUSign| ]] • [[Null cipher]] [[Talk:Null cipher| ]] • [[Numbers station]] [[Talk:Numbers station| ]] • [[NUSH]] [[Talk:NUSH| ]] • [[NTRU]] [[Talk:NTRU| ]] ==O== [[Oblivious transfer]] [[Talk:Oblivious transfer| ]] • [[OCB mode]] [[Talk:OCB mode| ]] • [[Oded Goldreich]] [[Talk:Oded Goldreich| ]] • [[Off-the-Record Messaging]] [[Talk:Off-the-Record Messaging| ]] • [[Okamoto–Uchiyama cryptosystem]] [[Talk:Okamoto–Uchiyama cryptosystem| ]] • [[OMI cryptograph]] [[Talk:OMI cryptograph| ]] • [[OMNI (SCIP)]] [[Talk:OMNI (SCIP)| ]] • [[One-key MAC]] [[Talk:One-key MAC| ]] • [[One-time pad]] [[Talk:One-time pad| ]] • [[One-time password]] [[Talk:One-time password| ]] • [[One-way compression function]] [[Talk:One-way compression function| ]] • [[One-way function]] [[Talk:One-way function| ]] • [[Onion routing]] [[Talk:Onion routing| ]] • [[Online Certificate Status Protocol]] [[Talk:Online Certificate Status Protocol| ]] • [[OP-20-G]] [[Talk:OP-20-G| ]] • [[OpenPGP card]] [[Talk:OpenPGP card| ]] • [[OpenSSH]] [[Talk:OpenSSH| ]] • [[OpenSSL]] [[Talk:OpenSSL| ]] • [[Openswan]] [[Talk:Openswan| ]] • [[OpenVPN]] [[Talk:OpenVPN| ]] • [[Operation Ruthless]] [[Talk:Operation Ruthless| ]] • [[Optimal asymmetric encryption padding]] [[Talk:Optimal asymmetric encryption padding| ]] • [[Over the Air Rekeying]] [[Talk:Over the Air Rekeying| ]] (OTAR) • [[OTFE]] [[Talk:OTFE| ]] • [[Otway–Rees protocol]] [[Talk:Otway–Rees protocol| ]] ==P== [[Padding (cryptography)]] [[Talk:Padding (cryptography)| ]] • [[Padding oracle attack]] [[Talk:Padding oracle attack| ]] • [[Paillier cryptosystem]] [[Talk:Paillier cryptosystem| ]] • [[Pairing-based cryptography]] [[Talk:Pairing-based cryptography| ]] • [[Panama (cryptography)]] [[Talk:Panama (cryptography)| ]] • [[Partitioning cryptanalysis]] [[Talk:Partitioning cryptanalysis| ]] • [[Passive attack]] [[Talk:Passive attack| ]] • [[Passphrase]] [[Talk:Passphrase| ]] • [[Password]] [[Talk:Password| ]] • [[Password-authenticated key agreement]] [[Talk:Password-authenticated key agreement| ]] • [[Password cracking]] [[Talk:Password cracking| ]] • [[Password Hashing Competition]] [[Talk:Password Hashing Competition| ]] • [[Paul Carl Kocher|Paul Kocher]] [[Talk:Paul Kocher| ]] • [[Paulo Pancatuccio]] [[Talk:Paulo Pancatuccio| ]] • [[Paulo S. L. M. Barreto]] [[Talk:Paulo S. L. M. Barreto| ]] • [[Paul van Oorschot]] [[Talk:Paul van Oorschot| ]] • [[PBKDF2]] [[Talk:PBKDF2| ]] • [[PC Bruno]] [[Talk:PC Bruno| ]] • [[Pepper (cryptography)]] [[Talk:Pepper (cryptography)| ]] • [[Perfect forward secrecy]] [[Talk:Perfect forward secrecy| ]] • [[Perforated sheets]] [[Talk:Perforated sheets| ]] • [[Permutation cipher]] [[Talk:Permutation cipher| ]] • [[Peter Gutmann (computer scientist)]] [[Talk:Peter Gutmann (computer scientist)| ]] • [[Peter Junger]] [[Talk:Peter Junger| ]] • [[Peter Twinn]] [[Talk:Peter Twinn| ]] • [[PGP Corporation]] [[Talk:PGP Corporation| ]] • [[PGPDisk]] [[Talk:PGPDisk| ]] • [[PGPfone]] [[Talk:PGPfone| ]] • [[Phelix]] [[Talk:Phelix| ]] • [[Phil Zimmermann]] [[Talk:Phil Zimmermann| ]] • [[Photuris (protocol)]] [[Talk:Photuris (protocol)| ]] • [[Physical security]] [[Talk:Physical security| ]] • [[Physical unclonable function]] [[Talk:Physical unclonable function| ]] • [[Pig Latin]] [[Talk:Pig Latin| ]] • [[Pigpen cipher]] [[Talk:Pigpen cipher| ]] • [[Pike (cipher)]] [[Talk:Pike (cipher)| ]] • [[Piling-up lemma]] [[Talk:Piling-up lemma| ]] • [[Pinwheel (cryptography)]] [[Talk:Pinwheel (cryptography)| ]] • [[Piotr Smoleński]] [[Talk:Piotr Smoleński| ]] • [[Pirate decryption]] [[Talk:Pirate decryption| ]] • [[PKC (conference)]] [[Talk:PKC (conference)| ]] • [[PKCS]] [[Talk:PKCS| ]] • [[PKCS 11]] [[Talk:PKCS 11| ]] • [[PKCS 12]] [[Talk:PKCS 12| ]] • [[PKIX]] [[Talk:PKIX| ]] • [[Plaintext]] [[Talk:Plaintext| ]] • [[Plaintext-aware encryption]] [[Talk:Plaintext-aware encryption| ]] • [[Playfair cipher]] [[Talk:Playfair cipher| ]] • [[Plugboard]] [[Talk:Plugboard| ]] • [[PMAC (cryptography)]] [[Talk:PMAC (cryptography)| ]] • [[Poem code]] [[Talk:Poem code| ]] • [[Pohlig–Hellman algorithm]] [[Talk:Pohlig–Hellman algorithm| ]] • [[Point-to-Point Tunneling Protocol]] [[Talk:Point-to-Point Tunneling Protocol| ]] • [[Pointcheval–Stern signature algorithm]] [[Talk:Pointcheval–Stern signature algorithm| ]] • [[Poly1305]] [[Talk:Poly1305| ]] • [[Polyalphabetic cipher]] [[Talk:Polyalphabetic cipher| ]] • [[Polybius square]] [[Talk:Polybius square| ]] • Portex [[Talk:Portex| ]] • [[Post-quantum cryptography]] [[Talk:Post-quantum cryptography| ]] • [[Post-Quantum Cryptography Standardization]] [[Talk:Post-Quantum Cryptography Standardization| ]] • [[Power analysis]] [[Talk:Power analysis| ]] • [[Preimage attack]] [[Talk:Preimage attack| ]] • [[Pre-shared key]] [[Talk:Pre-shared key| ]] • [[Pretty Good Privacy]] [[Talk:Pretty Good Privacy| ]] • [[Printer steganography]] [[Talk:Printer steganography| ]] • [[Privacy-enhanced Electronic Mail]] [[Talk:Privacy-enhanced Electronic Mail| ]] • [[Private Communications Technology]] [[Talk:Private Communications Technology| ]] • [[Private information retrieval]] [[Talk:Private information retrieval| ]] • [[Probabilistic encryption]] [[Talk:Probabilistic encryption| ]] • [[Product cipher]] [[Talk:Product cipher| ]] • [[Proof-of-work system]] [[Talk:Proof-of-work system| ]] • [[Protected Extensible Authentication Protocol]] [[Talk:Protected Extensible Authentication Protocol| ]] • [[Provable security]] [[Talk:Provable security| ]] • [[Provably secure cryptographic hash function]] [[Talk:Provably secure cryptographic hash function| ]] • [[Proxy re-encryption]] [[Talk:Proxy re-encryption| ]] • [[Pseudo-Hadamard transform]] [[Talk:Pseudo-Hadamard transform| ]] • [[Pseudonymity]] [[Talk:Pseudonymity| ]] • [[Pseudorandom function]] [[Talk:Pseudorandom function| ]] • [[Pseudorandom number generator]] [[Talk:Pseudorandom number generator| ]] • [[Pseudorandom permutation]] [[Talk:Pseudorandom permutation| ]] • [[Public key certificate]] [[Talk:Public key certificate| ]] • [[Public-key cryptography]] [[Talk:Public-key cryptography| ]] • [[Public key fingerprint]] [[Talk:Public key fingerprint| ]] • [[Public key infrastructure]] [[Talk:Public key infrastructure| ]] • [[PURPLE]] [[Talk:PURPLE| ]] • [[PuTTY]] [[Talk:PuTTY| ]] • [[Py (cipher)]] [[Talk:Py (cipher)| ]] ==Q== [[Q (cipher)]] [[Talk:Q (cipher)| ]] • [[Qrpff]] [[Talk:Qrpff| ]] • [[QUAD (cipher)]] [[Talk:QUAD (cipher)| ]] • [[Quadratic sieve]] [[Talk:Quadratic sieve| ]] • [[Quantum coin flipping]] [[Talk:Quantum coin flipping| ]] • [[Quantum cryptography]] [[Talk:Quantum cryptography| ]] • [[Quantum digital signature]] [[Talk:Quantum digital signature| ]] • [[Quantum fingerprinting]] [[Talk:Quantum fingerprinting| ]] • [[Quantum key distribution]] [[Talk:Quantum key distribution| ]] ==R== [[Rabbit (cipher)]] [[Talk:Rabbit (cipher)| ]] • [[Rabin cryptosystem]] [[Talk:Rabin cryptosystem| ]] • [[Rabin–Williams encryption]] [[Talk:Rabin–Williams encryption| ]] • [[RadioGatún]] [[Talk:RadioGatún| ]] • [[Rail fence cipher]] [[Talk:Rail fence cipher| ]] • [[Rainbow table]] [[Talk:Rainbow table| ]] • [[Ralph Merkle]] [[Talk:Ralph Merkle| ]] • [[Rambutan (cryptography)]] [[Talk:Rambutan (cryptography)| ]] • [[Random function]] [[Talk:Random function| ]] • [[Randomness tests]] [[Talk:Randomness tests| ]] • [[Random number generator attack]] [[Talk:Random number generator attack| ]] • [[Random oracle]] [[Talk:Random oracle| ]] • [[RC2]] [[Talk:RC2| ]] • [[RC4]] [[Talk:RC4| ]] • [[RC5]] [[Talk:RC5| ]] • [[RC6]] [[Talk:RC6| ]] • [[Rebound attack]] [[Talk:Rebound attack| ]] • [[Reciprocal cipher]] [[Talk:Reciprocal cipher| ]] • [[Red/black concept]] [[Talk:Red/black concept| ]] • [[REDOC]] [[Talk:REDOC| ]] • [[Red Pike (cipher)]] [[Talk:Red Pike (cipher)| ]] • [[Reflector (cipher machine)]] [[Talk:Reflector (cipher machine)| ]] • [[Regulation of Investigatory Powers Act 2000]] [[Talk:Regulation of Investigatory Powers Act 2000| ]] • [[Reihenschieber]] [[Talk:Reihenschieber| ]] • [[Rekeying (cryptography)]] [[Talk:Rekeying| ]] • [[Related-key attack]] [[Talk:Related-key attack| ]] • [[Replay attack]] [[Talk:Replay attack| ]] • [[Reservehandverfahren]] [[Talk:Reservehandverfahren| ]] • [[Residual block termination]] [[Talk:Residual block termination| ]] • [[Rijndael key schedule]] [[Talk:Rijndael key schedule| ]] • [[Rijndael S-box]] [[Talk:Rijndael S-box| ]] • [[Ring signature]] [[Talk:Ring signature| ]] • [[RIPEMD]] [[Talk:RIPEMD| ]] • [[Rip van Winkle cipher]] [[Talk:Rip van Winkle cipher| ]] • [[Robert Morris (cryptographer)]] [[Talk:Robert Morris (cryptographer)| ]] • Robot certificate authority [[Talk:Robot certificate authority| ]] • [[Rockex]] [[Talk:Rockex| ]] • [[Rolf Noskwith]] [[Talk:Rolf Noskwith| ]] • [[Ron Rivest]] [[Talk:Ron Rivest| ]] • [[Room 40]] [[Talk:Room 40| ]] • [[Root certificate]] [[Talk:Root certificate| ]] • [[Ross J. Anderson]] [[Talk:Ross Anderson| ]] • [[Rossignols]] [[Talk:Rossignols| ]] • [[ROT13]] [[Talk:ROT13| ]] • [[Rotor machine]] [[Talk:Rotor machine| ]] • [[RSA (cryptosystem)|RSA]] [[Talk:RSA (cryptosystem)|RSA]] • [[RSA-100]] [[Talk:RSA-100| ]] • [[RSA-1024]] [[Talk:RSA-1024| ]] • [[RSA-110]] [[Talk:RSA-110| ]] • [[RSA-120]] [[Talk:RSA-120| ]] • [[RSA-129]] [[Talk:RSA-129| ]] • [[RSA-130]] [[Talk:RSA-130| ]] • [[RSA-140]] [[Talk:RSA-140| ]] • [[RSA-150]] [[Talk:RSA-150| ]] • [[RSA-1536]] [[Talk:RSA-1536| ]] • [[RSA-155]] [[Talk:RSA-155| ]] • [[RSA-160]] [[Talk:RSA-160| ]] • [[RSA-170]] [[Talk:RSA-170| ]] • [[RSA-180]] [[Talk:RSA-180| ]] • [[RSA-190]] [[Talk:RSA-190| ]] • [[RSA-200]] [[Talk:RSA-200| ]] • [[RSA-2048]] [[Talk:RSA-2048| ]] • [[RSA-210]] [[Talk:RSA-210| ]] • [[RSA-220]] [[Talk:RSA-220| ]] • [[RSA-230]] [[Talk:RSA-230| ]] • [[RSA-232]] [[Talk:RSA-232| ]] • [[RSA-240]] [[Talk:RSA-240| ]] • [[RSA-250]] [[Talk:RSA-250| ]] • [[RSA-260]] [[Talk:RSA-260| ]] • [[RSA-270]] [[Talk:RSA-270| ]] • [[RSA-280]] [[Talk:RSA-280| ]] • [[RSA-290]] [[Talk:RSA-290| ]] • [[RSA-300]] [[Talk:RSA-300| ]] • [[RSA-309]] [[Talk:RSA-309| ]] • [[RSA-310]] [[Talk:RSA-310| ]] • [[RSA-320]] [[Talk:RSA-320| ]] • [[RSA-330]] [[Talk:RSA-330| ]] • [[RSA-340]] [[Talk:RSA-340| ]] • [[RSA-350]] [[Talk:RSA-350| ]] • [[RSA-360]] [[Talk:RSA-360| ]] • [[RSA-370]] [[Talk:RSA-370| ]] • [[RSA-380]] [[Talk:RSA-380| ]] • [[RSA-390]] [[Talk:RSA-390| ]] • [[RSA-400]] [[Talk:RSA-400| ]] • [[RSA-410]] [[Talk:RSA-410| ]] • [[RSA-420]] [[Talk:RSA-420| ]] • [[RSA-430]] [[Talk:RSA-430| ]] • [[RSA-440]] [[Talk:RSA-440| ]] • [[RSA-450]] [[Talk:RSA-450| ]] • [[RSA-460]] [[Talk:RSA-460| ]] • [[RSA-470]] [[Talk:RSA-470| ]] • [[RSA-480]] [[Talk:RSA-480| ]] • [[RSA-490]] [[Talk:RSA-490| ]] • [[RSA-500]] [[Talk:RSA-500| ]] • [[RSA-576]] [[Talk:RSA-576| ]] • [[RSA-617]] [[Talk:RSA-617| ]] • [[RSA-640]] [[Talk:RSA-640| ]] • [[RSA-704]] [[Talk:RSA-704| ]] • [[RSA-768]] [[Talk:RSA-768| ]] • [[RSA-896]] [[Talk:RSA-896| ]] • [[RSA-PSS]] [[Talk:RSA-PSS| ]] • [[RSA Factoring Challenge]] [[Talk:RSA Factoring Challenge| ]] • [[RSA problem]] [[Talk:RSA problem| ]] • [[RSA Secret-Key Challenge]] [[Talk:RSA Secret-Key Challenge| ]] • [[RSA Security]] [[Talk:RSA Security| ]] • [[Rubber-hose cryptanalysis]] [[Talk:Rubber-hose cryptanalysis| ]] • [[Running key cipher]] [[Talk:Running key cipher| ]] • [[Russian copulation]] [[Talk:Russian copulation| ]] ==S== [[S-1 block cipher]] [[Talk:S-1| ]] • [[Secure and Fast Encryption Routine|SAFER]] [[Talk:SAFER| ]] • [[Salsa20]] [[Talk:Salsa20| ]] • [[Salt (cryptography)]] [[Talk:Salt (cryptography)| ]] • [[SAM card]] [[Talk:SAM card| ]] • [[Security Support Provider Interface]] [[Talk:Security Support Provider Interface| ]] • [[Security Assertion Markup Language|SAML]] [[Talk:SAML| ]] • [[SAVILLE]] [[Talk:SAVILLE| ]] • [[SC2000]] [[Talk:SC2000| ]] • [[Schnorr group]] [[Talk:Schnorr group| ]] • [[Schnorr signature]] [[Talk:Schnorr signature| ]] • [[Schoof–Elkies–Atkin algorithm]] [[Talk:Schoof–Elkies–Atkin algorithm| ]] • [[Secure Communications Interoperability Protocol|SCIP]] [[Talk:SCIP| ]] • [[Scott Vanstone]] [[Talk:Scott Vanstone| ]] • [[Scrambler]] [[Talk:Scrambler| ]] • [[Scramdisk]] [[Talk:Scramdisk| ]] • [[Scream (cipher)]] [[Talk:Scream (cipher)| ]] • [[Scrypt]] [[Talk:Scrypt| ]] • [[Scytale]] [[Talk:Scytale| ]] • [[Seahorse (software)]] [[Talk:Seahorse (software)| ]] • [[SEAL (cipher)]] [[Talk:SEAL (cipher)| ]] • [[Sean Murphy (cryptographer)]] [[Talk:Sean Murphy (cryptographer)| ]] • [[SECG]] [[Talk:SECG| ]] • [[Secret broadcast]] [[Talk:Secret broadcast| ]] • [[Secret decoder ring]] [[Talk:Secret decoder ring| ]] • [[Secrets and Lies (Schneier)]] [[Talk:Secrets and Lies (Schneier)| ]] • [[Secret sharing]] [[Talk:Secret sharing| ]] • [[Sectéra Secure Module]] [[Talk:Sectéra Secure Module| ]] • [[Secure access module]] [[Talk:Secure access module| ]] • [[Secure channel]] [[Talk:Secure channel| ]] • [[Secure Communication based on Quantum Cryptography]] [[Talk:Secure Communication based on Quantum Cryptography| ]] • [[Secure copy]] [[Talk:Secure copy| ]] • [[Secure cryptoprocessor]] [[Talk:Secure cryptoprocessor| ]] • [[Secure Electronic Transaction]] [[Talk:Secure Electronic Transaction| ]] • [[Secure Hash Algorithms]] [[Talk:Secure Hash Algorithms| ]] • [[Secure Hypertext Transfer Protocol]] [[Talk:Secure Hypertext Transfer Protocol| ]] • [[Secure key issuing cryptography]] [[Talk:Secure key issuing cryptography| ]] • [[Secure multi-party computation]] [[Talk:Secure multi-party computation| ]] • [[Secure Neighbor Discovery]] [[Talk:Secure Neighbor Discovery| ]] • [[Secure Real-time Transport Protocol]] [[Talk:Secure Real-time Transport Protocol| ]] • [[Secure remote password protocol]] [[Talk:Secure remote password protocol| ]] • [[Secure Shell]] [[Talk:Secure Shell| ]] • [[Secure telephone]] [[Talk:Secure telephone| ]] • [[Secure Terminal Equipment]] [[Talk:Secure Terminal Equipment| ]] • [[Secure voice]] [[Talk:Secure voice| ]] • [[SecurID]] [[Talk:SecurID| ]] • [[Security association]] [[Talk:Security association| ]] • [[Security engineering]] [[Talk:Security engineering| ]] • [[Security level]] [[Talk:Security level| ]] • [[Security parameter]] [[Talk:Security parameter| ]] • [[Security protocol notation]] [[Talk:Security protocol notation| ]] • [[Security through obscurity]] [[Talk:Security through obscurity| ]] • [[Security token]] [[Talk:Security token| ]] • [[SEED]] [[Talk:SEED| ]] • [[Selected Areas in Cryptography]] [[Talk:Selected Areas in Cryptography| ]] • [[Self-certifying File System]] [[Talk:Self-certifying File System| ]] • [[Self-shrinking generator]] [[Talk:Self-shrinking generator| ]] • [[Self-signed certificate]] [[Talk:Self-signed certificate| ]] • [[Semantic security]] [[Talk:Semantic security| ]] • [[Serge Vaudenay]] [[Talk:Serge Vaudenay| ]] • [[Serpent (cipher)]] [[Talk:Serpent (cipher)| ]] • [[Session key]] [[Talk:Session key| ]] • [[SHACAL]] [[Talk:SHACAL| ]] • [[Shafi Goldwasser]] [[Talk:Shafi Goldwasser| ]] • [[SHA-1]] [[Talk:SHA-1| ]] • [[SHA-2]] [[Talk:SHA-2| ]] • [[SHA-3]] [[Talk:SHA-3| ]] • [[Shared secret]] [[Talk:Shared secret| ]] • [[SHARK]] [[Talk:SHARK| ]] • [[Shaun Wylie]] [[Talk:Shaun Wylie| ]] • [[Shor's algorithm]] [[Talk:Shor's algorithm| ]] • [[Shrinking generator]] [[Talk:Shrinking generator| ]] • [[Shugborough inscription]] [[Talk:Shugborough inscription| ]] • [[Side-channel attack]] [[Talk:Side-channel attack| ]] • [[Siemens and Halske T52]] [[Talk:Siemens and Halske T52| ]] • [[SIGABA]] [[Talk:SIGABA| ]] • [[SIGCUM]] [[Talk:SIGCUM| ]] • [[SIGINT]] [[Talk:SIGINT| ]] • [[Signal Protocol]] [[Talk:Signal Protocol| ]] • [[Signal Intelligence Service]] [[Talk:Signal Intelligence Service| ]] • [[Signcryption]] [[Talk:Signcryption| ]] • [[SIGSALY]] [[Talk:SIGSALY| ]] • [[SILC (protocol)]] [[Talk:SILC (protocol)| ]] • [[Silvio Micali]] [[Talk:Silvio Micali| ]] • [[Simple Authentication and Security Layer]] [[Talk:Simple Authentication and Security Layer| ]] • [[Simple public-key infrastructure]] [[Talk:Simple public-key infrastructure| ]] • [[Simple XOR cipher]] [[Talk:Simple XOR cipher| ]] • [[S/KEY]] [[Talk:S/KEY| ]] • [[Skein (hash function)]] [[Talk:Skein (hash function)| ]] • [[Skipjack (cipher)]] [[Talk:Skipjack (cipher)| ]] • [[Slide attack]] [[Talk:Slide attack| ]] • [[Slidex]] [[Talk:Slidex| ]] • [[Small subgroup confinement attack]] [[Talk:Small subgroup confinement attack| ]] • [[S/MIME]] [[Talk:S/MIME| ]] • [[SM4 algorithm]] [[Talk:SM4 algorithm| ]] (formerly SMS4) • [[Snake oil (cryptography)]] [[Talk:Snake oil (cryptography)| ]] • [[Snefru]] [[Talk:Snefru| ]] • [[SNOW]] [[Talk:SNOW| ]] • [[Snuffle]] [[Talk:Snuffle| ]] • [[SOBER-128]] [[Talk:SOBER-128| ]] • [[Solitaire (cipher)]] [[Talk:Solitaire (cipher)| ]] • [[Solomon Kullback]] [[Talk:Solomon Kullback| ]] • [[SOSEMANUK]] [[Talk:SOSEMANUK| ]] • [[Special Collection Service]] [[Talk:Special Collection Service| ]] • [[Spectr-H64]] [[Talk:Spectr-H64| ]] • [[SPEKE (cryptography)]] [[Talk:SPEKE (cryptography)| ]] • [[Sponge function]] [[Talk:Sponge function| ]] • [[SPNEGO]] [[Talk:SPNEGO| ]] • [[Square (cipher)]] [[Talk:Square (cipher)| ]] • [[Ssh-agent]] [[Talk:Ssh-agent| ]] • [[Ssh-keygen]] [[Talk: Ssh-keygen| ]] • [[SSH File Transfer Protocol]] [[Talk:SSH File Transfer Protocol| ]] • [[SSLeay]] [[Talk:SSLeay| ]] • [[Stafford Tavares]] [[Talk:Stafford Tavares| ]] • [[Standard model (cryptography)]] [[Talk:Standard model (cryptography)| ]] • [[Station CAST]] [[Talk:Station CAST| ]] • [[Station HYPO]] [[Talk:Station HYPO| ]] • [[Station-to-Station protocol]] [[Talk:Station-to-Station protocol| ]] • [[Statistical cryptanalysis]] [[Talk:Statistical cryptanalysis| ]] • [[Stefan Lucks]] [[Talk:Stefan Lucks| ]] • [[Steganalysis]] [[Talk:Steganalysis| ]] • [[Steganography]] [[Talk:Steganography| ]] • [[Straddling checkerboard]] [[Talk:Straddling checkerboard| ]] • [[Stream cipher]] [[Talk:Stream cipher| ]] • [[Stream cipher attacks]] [[Talk:Stream cipher attacks| ]] • [[Strong cryptography]] [[Talk:Strong cryptography| ]] • [[Strong RSA assumption]] [[Talk:Strong RSA assumption| ]] • [[Stuart Milner-Barry]] [[Talk:Stuart Milner-Barry| ]] • [[STU-II]] [[Talk:STU-II| ]] • [[STU-III]] [[Talk:STU-III| ]] • [[Stunnel]] [[Talk:Stunnel| ]] • [[Substitution box]] [[Talk:Substitution box| ]] • [[Substitution cipher]] [[Talk:Substitution cipher| ]] • [[Substitution–permutation network]] [[Talk:Substitution–permutation network| ]] • [[Superencryption]] [[Talk:Superencryption| ]] • [[Supersingular isogeny key exchange]] [[Talk:Supersingular isogeny key exchange| ]] • [[Swedish National Defence Radio Establishment]] [[Talk:Swedish National Defence Radio Establishment| ]] • [[SWIFFT]] [[Talk:SWIFFT| ]] • [[SXAL/MBAL]] [[Talk:SXAL/MBAL| ]] • [[Symmetric-key algorithm]] [[Talk:Symmetric-key algorithm| ]] • [[SYSKEY]] [[Talk:SYSKEY| ]] ==T== [[Tabula recta]] [[Talk:Tabula recta| ]] • [[Taher Elgamal]] [[Talk:Taher Elgamal| ]] • [[Tamper resistance]] [[Talk:Tamper resistance| ]] • [[Tcpcrypt]] [[Talk:Tcpcrypt| ]] • [[Television encryption]] [[Talk:Television encryption| ]] • [[Tempest (codename)|TEMPEST]] [[Talk:TEMPEST| ]] • [[Template:Cryptographic software]] [[Talk:Cryptographic software| ]] • [[Temporal Key Integrity Protocol]] [[Talk:Temporal Key Integrity Protocol| ]] • [[Testery]] [[Talk:Testery| ]] • [[Thawte]] [[Talk:Thawte| ]] • [[The Alphabet Cipher]] [[Talk:The Alphabet Cipher| ]] • [[The Code Book]] [[Talk:The Code Book| ]] • [[The Codebreakers]] [[Talk:The Codebreakers| ]] • [[The Gold-Bug]] [[Talk:The Gold-Bug| ]] • [[The Magic Words are Squeamish Ossifrage]] [[Talk:The Magic Words are Squeamish Ossifrage| ]] • [[Theory of Cryptography Conference]] [[Talk:Theory of Cryptography Conference| ]] • [[The world wonders]] [[Talk:The world wonders| ]] • [[Thomas Jakobsen]] [[Talk:Thomas Jakobsen| ]] • [[Three-pass protocol]] [[Talk:Three-pass protocol| ]] • [[Threshold shadow scheme]] [[Talk:Threshold shadow scheme| ]] • [[TICOM]] [[Talk:TICOM| ]] • [[Tiger (cryptography)]] [[Talk:Tiger (cryptography)| ]] • [[Timeline of cryptography]] [[Talk:Timeline of cryptography| ]] • [[Time/memory/data tradeoff attack]] [[Talk:Time/memory/data tradeoff attack| ]] • [[Time-based One-time Password algorithm]] [[Talk:Time-based One-time Password algorithm| ]] (TOTP) • [[Timing attack]] [[Talk:Timing attack| ]] • [[Tiny Encryption Algorithm]] [[Talk:Tiny Encryption Algorithm| ]] • [[Tom Berson]] [[Talk:Tom Berson| ]] • [[Tommy Flowers]] [[Talk:Tommy Flowers| ]] • [[Topics in cryptography]] [[Talk:Topics in cryptography| ]] • [[Tor (anonymity network)]] [[Talk:Tor (anonymity network)| ]] • [[Torus-based cryptography]] [[Talk:Torus-based cryptography| ]] • [[Traffic analysis]] [[Talk:Traffic analysis| ]] • [[Traffic-flow security]] [[Talk:Traffic-flow security| ]] • [[Traitor tracing]] [[Talk:Traitor tracing| ]] • [[Transmission security]] [[Talk:Transmission security| ]] • [[Transport Layer Security]] [[Talk:Transport Layer Security| ]] • [[Transposition cipher]] [[Talk:Transposition cipher| ]] • [[Trapdoor function]] [[Talk:Trapdoor function| ]] • [[Trench code]] [[Talk:Trench code| ]] • [[Treyfer]] [[Talk:Treyfer| ]] • [[Trifid cipher]] [[Talk:Trifid cipher| ]] • [[Triple DES]] [[Talk:Triple DES| ]] • [[Trivium (cipher)]] [[Talk:Trivium (cipher)| ]] • [[TrueCrypt]] [[Talk:TrueCrypt| ]] • [[Truncated differential cryptanalysis]] [[Talk:Truncated differential cryptanalysis| ]] • [[Trusted third party]] [[Talk:Trusted third party| ]] • [[Turing (cipher)]] [[Talk:Turing (cipher)| ]] • [[TWINKLE]] [[Talk:TWINKLE| ]] • [[TWIRL]] [[Talk:TWIRL| ]] • [[Twofish]] [[Talk:Twofish| ]] • [[Two-square cipher]] [[Talk:Two-square cipher| ]] • [[Type 1 encryption]] [[Talk:Type 1 encryption| ]] • [[Type 2 encryption]] [[Talk:Type 2 encryption| ]] • [[Type 3 encryption]] [[Talk:Type 3 encryption| ]] • [[Type 4 encryption]] [[Talk:Type 4 encryption| ]] • [[Typex]] [[Talk:Typex| ]] ==U== [[UES (cipher)]] [[Talk:UES (cipher)| ]] • [[Ultra (cryptography)]] [[Talk:Ultra (cryptography)| ]] • [[UMAC (cryptography)|UMAC]] [[Talk:UMAC| ]] • [[Unbalanced Oil and Vinegar]] [[Talk:Unbalanced Oil and Vinegar| ]] • [[Undeniable signature]] [[Talk:Undeniable signature| ]] • [[Unicity distance]] [[Talk:Unicity distance| ]] • [[Universal composability]] [[Talk:Universal composability| ]] • [[Universal one-way hash function]] [[Talk:Universal one-way hash function| ]] (UOWHF) ==V== [[Venona project]] [[Talk:Venona project| ]] • [[Verifiable secret sharing]] [[Talk:Verifiable secret sharing| ]] • [[Verisign]] [[Talk:Verisign| ]] • [[Very smooth hash]] [[Talk:Very smooth hash| ]] • [[VEST]] [[Talk:VEST| ]] • [[VIC cipher]] [[Talk:VIC cipher| ]] • [[VideoCrypt]] [[Talk:VideoCrypt| ]] • [[Vigenère cipher]] [[Talk:Vigenère cipher| ]] • [[Vincent Rijmen]] [[Talk:Vincent Rijmen| ]] • [[VINSON]] [[Talk:VINSON| ]] • [[Virtual private network]] [[Talk:Virtual private network| ]] • [[Visual cryptography]] [[Talk:Visual cryptography| ]] • [[Voynich manuscript]] [[Talk:Voynich manuscript| ]] ==W== [[Wadsworth's cipher]] [[Talk:Wadsworth's cipher| ]] • [[WAKE (cipher)|WAKE]] [[Talk:WAKE| ]] • [[WLAN Authentication and Privacy Infrastructure]] [[Talk:WAPI| ]] • [[Watermark (data file)]] [[Talk:Watermark (data file)| ]] • [[Watermarking attack]] [[Talk:Watermarking attack| ]] • [[Weak key]] [[Talk:Weak key| ]] • [[Web of trust]] [[Talk:Web of trust| ]] • [[Whirlpool (hash function)]] [[Talk:Whirlpool (hash function)| ]] • [[Whitfield Diffie]] [[Talk:Whitfield Diffie| ]] • [[Wide Mouth Frog protocol]] [[Talk:Wide Mouth Frog protocol| ]] • [[Wi-Fi Protected Access]] [[Talk:Wi-Fi Protected Access| ]] • [[William F. Friedman]] [[Talk:William F. Friedman| ]] • [[William Montgomery (cryptographer)]] [[Talk:William Montgomery (cryptographer)| ]] • [[WinSCP]] [[Talk:WinSCP| ]] • [[Wired Equivalent Privacy]] [[Talk:Wired Equivalent Privacy| ]] • [[Wireless Transport Layer Security]] [[Talk:Wireless Transport Layer Security| ]] • [[Witness-indistinguishable proof]] [[Talk:Witness-indistinguishable proof| ]] • [[Workshop on Cryptographic Hardware and Embedded Systems]] [[Talk:Workshop on Cryptographic Hardware and Embedded Systems| ]] • [[World War I cryptography]] [[Talk:World War I cryptography| ]] • [[World War II cryptography]] [[Talk:World War II cryptography| ]] • [[W. T. Tutte]] [[Talk:W. T. Tutte| ]] ==X== [[X.509]] [[Talk:X.509| ]] • [[XDH assumption]] [[Talk:XDH assumption| ]] • [[Xiaoyun Wang]] [[Talk:Xiaoyun Wang| ]] • [[XML Encryption]] [[Talk:XML Encryption| ]] • [[XML Signature]] [[Talk:XML Signature| ]] • [[xmx]] [[Talk:xmx| ]] • [[XSL attack]] [[Talk:XSL attack| ]] • [[XTEA]] [[Talk:XTEA| ]] • [[XTR]] [[Talk:XTR| ]] • [[Xuejia Lai]] [[Talk:Xuejia Lai| ]] • [[XXTEA]] [[Talk:XXTEA| ]] 10-00-00-00-00 ==Y== [[Yarrow algorithm]] [[Talk:Yarrow algorithm| ]] • [[Y-stations]] [[Talk:Y-stations| ]] • [[Yuliang Zheng]] [[Talk:Yuliang Zheng| ]] ==Z== [[Zeroisation]] [[Talk:Zeroisation| ]] • [[Zero-knowledge password proof]] [[Talk:Zero-knowledge password proof| ]] • [[Zero-knowledge proof]] [[Talk:Zero-knowledge proof| ]] • [[Zfone]] [[Talk:Zfone| ]] • [[Zodiac (cipher)]] [[Talk:Zodiac (cipher)| ]] • [[ZRTP]] [[Talk:ZRTP| ]] • [[Zimmermann–Sassaman key-signing protocol]] [[Talk:Zimmermann–Sassaman key-signing protocol| ]] • [[Zimmermann Telegram]] [[Talk:Zimmermann Telegram| ]] ==See also== * [[Outline of cryptography]] – an analytical list of articles and terms. * [[Books on cryptography]] – an annotated list of suggested readings. * [[List of cryptographers]] – an annotated list of cryptographers. * [[Wikipedia:WikiProject Cryptography|WikiProject Cryptography]] – discussion and resources for editing cryptography articles. [[Category:Cryptography lists and comparisons]] [[Category:Wikipedia indexes|Cryptography]]<!--Change to Indexes of computing topics, when it exists.--> [[Category:Mathematics-related lists|Cryptography]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:Short description
(
edit
)