The following pages link to Code (cryptography)
External toolsShowing 50 items.
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)- Analysis (links | edit)
- Code (links | edit)
- Cipher (links | edit)
- Cryptanalysis (links | edit)
- Enigma machine (links | edit)
- Information theory (links | edit)
- National Security Agency (links | edit)
- One-time pad (links | edit)
- Double-Cross System (links | edit)
- Mata Hari (links | edit)
- Atbash (links | edit)
- Substitution cipher (links | edit)
- Transposition cipher (links | edit)
- ROT13 (links | edit)
- Caesar cipher (links | edit)
- Vigenère cipher (links | edit)
- Cryptogram (links | edit)
- Poem code (links | edit)
- Broadcasting (links | edit)
- Scytale (links | edit)
- Autokey cipher (links | edit)
- Polyalphabetic cipher (links | edit)
- Tabula recta (links | edit)
- Index of coincidence (links | edit)
- Frequency analysis (links | edit)
- Sarah Aaronsohn (links | edit)
- Nili (links | edit)
- Playfair cipher (links | edit)
- Leather subculture (links | edit)
- Ahmed Chalabi (links | edit)
- Whistled language (links | edit)
- Floradora (links | edit)
- Zimmermann telegram (links | edit)
- Index of cryptography articles (links | edit)
- Null cipher (links | edit)
- Hull note (links | edit)
- VIC cipher (links | edit)
- Charlie Soong (links | edit)
- Straddling checkerboard (links | edit)
- Book cipher (links | edit)
- Running key cipher (links | edit)
- Affine cipher (links | edit)
- Frank Rowlett (links | edit)
- Codetext (redirect page) (links | edit)
- Advanced Encryption Standard (links | edit)
- Blowfish (cipher) (links | edit)
- Block cipher (links | edit)
- Cipher (links | edit)
- Cryptanalysis (links | edit)
- Key size (links | edit)
- Diffie–Hellman key exchange (links | edit)
- Data Encryption Standard (links | edit)
- Differential cryptanalysis (links | edit)
- Enigma machine (links | edit)
- Elliptic-curve cryptography (links | edit)
- Encryption (links | edit)
- International Data Encryption Algorithm (links | edit)
- HMAC (links | edit)
- MD5 (links | edit)
- One-time pad (links | edit)
- RSA (cryptosystem) (links | edit)
- RC4 (links | edit)
- RIPEMD (links | edit)
- SHA-1 (links | edit)
- Steganography (links | edit)
- Typex (links | edit)
- List of telecommunications encryption terms (links | edit)
- Hash collision (links | edit)
- Atbash (links | edit)
- Substitution cipher (links | edit)
- Transposition cipher (links | edit)
- ROT13 (links | edit)
- Triple DES (links | edit)
- Caesar cipher (links | edit)
- Stream cipher (links | edit)
- Type B Cipher Machine (links | edit)
- Key (cryptography) (links | edit)
- Symmetric-key algorithm (links | edit)
- Brute-force attack (links | edit)
- ElGamal encryption (links | edit)
- Linear cryptanalysis (links | edit)
- Digital Signature Algorithm (links | edit)
- Digital signature (links | edit)
- Merkle–Hellman knapsack cryptosystem (links | edit)
- Vigenère cipher (links | edit)
- Cryptogram (links | edit)
- Advanced Encryption Standard process (links | edit)
- RC5 (links | edit)
- Initialization vector (links | edit)
- Poem code (links | edit)
- SIGABA (links | edit)
- Scytale (links | edit)
- Autokey cipher (links | edit)
- Polyalphabetic cipher (links | edit)
- Tabula recta (links | edit)
- Index of coincidence (links | edit)
- Frequency analysis (links | edit)
- Plaintext (links | edit)
- Block cipher mode of operation (links | edit)
- RC6 (links | edit)
- Playfair cipher (links | edit)
- Ciphertext (links | edit)
- Cryptographically secure pseudorandom number generator (links | edit)
- Birthday attack (links | edit)
- Public key infrastructure (links | edit)
- Hebern rotor machine (links | edit)
- Rotor machine (links | edit)
- Velvalee Dickinson (links | edit)
- S-box (links | edit)
- CAST-128 (links | edit)
- Block size (cryptography) (links | edit)
- 3-Way (links | edit)
- SEAL (cipher) (links | edit)
- Pike (cipher) (links | edit)
- Fish (cryptography) (links | edit)
- A5/1 (links | edit)
- ISAAC (cipher) (links | edit)
- Web of trust (links | edit)
- Lorenz cipher (links | edit)
- VIC cipher (links | edit)
- Siemens and Halske T52 (links | edit)
- Feistel cipher (links | edit)
- Lucifer (cipher) (links | edit)
- Serpent (cipher) (links | edit)
- Substitution–permutation network (links | edit)
- Straddling checkerboard (links | edit)
- Meet-in-the-middle attack (links | edit)
- Cryptographic hash function (links | edit)
- Visual cryptography (links | edit)
- Cryptographic Message Syntax (links | edit)
- Book cipher (links | edit)
- Key derivation function (links | edit)
- Elliptic Curve Digital Signature Algorithm (links | edit)
- Schnorr signature (links | edit)
- Snefru (links | edit)
- Running key cipher (links | edit)
- Affine cipher (links | edit)
- Rabin cryptosystem (links | edit)
- Secret sharing (links | edit)
- Skipjack (cipher) (links | edit)
- Paillier cryptosystem (links | edit)
- NTRUEncrypt (links | edit)
- Timing attack (links | edit)
- S-1 block cipher (links | edit)
- Iraqi block cipher (links | edit)
- GOST (block cipher) (links | edit)
- NESSIE (links | edit)
- Cryptosystem (links | edit)
- Tiger (hash function) (links | edit)
- History of cryptography (links | edit)
- Tiny Encryption Algorithm (links | edit)
- XTEA (links | edit)
- Camellia (cipher) (links | edit)
- MARS (cipher) (links | edit)
- Red Pike (cipher) (links | edit)
- A5/2 (links | edit)
- ADFGVX cipher (links | edit)
- Polybius square (links | edit)
- CRYPTREC (links | edit)
- Hyperelliptic curve cryptography (links | edit)
- Message authentication code (links | edit)
- One-key MAC (links | edit)
- Whirlpool (hash function) (links | edit)
- MD4 (links | edit)
- Cryptographic protocol (links | edit)
- Padding (cryptography) (links | edit)
- FEAL (links | edit)
- MAGENTA (links | edit)
- Product cipher (links | edit)
- GMR (cryptography) (links | edit)
- WAKE (cipher) (links | edit)
- Great Cipher (links | edit)
- Key schedule (links | edit)
- LOKI97 (links | edit)
- KASUMI (links | edit)
- CAST-256 (links | edit)
- MISTY1 (links | edit)
- Square (cipher) (links | edit)
- KHAZAD (links | edit)
- PKCS (links | edit)
- SHARK (links | edit)
- DES-X (links | edit)
- SAFER (links | edit)
- GDES (links | edit)
- RC2 (links | edit)
- Bifid cipher (links | edit)
- Khufu and Khafre (links | edit)
- LOKI (links | edit)
- XSL attack (links | edit)
- Cellular Message Encryption Algorithm (links | edit)
- DEAL (links | edit)
- Side-channel attack (links | edit)
- Cryptex (links | edit)
- MMB (cipher) (links | edit)
- Salt (cryptography) (links | edit)
- Classical cipher (links | edit)
- Mod n cryptanalysis (links | edit)
- Piling-up lemma (links | edit)
- MacGuffin (cipher) (links | edit)
- Madryga (links | edit)
- Weak key (links | edit)
- McEliece cryptosystem (links | edit)
- Cardan grille (links | edit)
- M-94 (links | edit)
- SIGSALY (links | edit)
- M-209 (links | edit)
- Avalanche effect (links | edit)
- STU-III (links | edit)
- Kasiski examination (links | edit)
- Secure Terminal Equipment (links | edit)
- CipherSaber (links | edit)
- NewDES (links | edit)
- EFF DES cracker (links | edit)
- Jefferson disk (links | edit)
- DES supplementary material (links | edit)
- SHACAL (links | edit)
- Phelix (links | edit)
- TrueCrypt (links | edit)
- Preimage attack (links | edit)
- Collision attack (links | edit)
- N-hash (links | edit)
- KW-26 (links | edit)
- KW-37 (links | edit)
- KL-7 (links | edit)
- Cayley–Purser algorithm (links | edit)
- HAVAL (links | edit)
- MD2 (hash function) (links | edit)
- Secure Communications Interoperability Protocol (links | edit)
- SEED (links | edit)
- HAS-160 (links | edit)
- VINSON (links | edit)
- SAVILLE (links | edit)
- BATON (links | edit)
- NSA cryptography (links | edit)
- SOBER-128 (links | edit)
- Hill cipher (links | edit)
- NEMA (machine) (links | edit)
- Certificate signing request (links | edit)
- REDOC (links | edit)
- FROG (links | edit)
- Pigpen cipher (links | edit)
- Ciphertext stealing (links | edit)
- Stream cipher attacks (links | edit)
- Strong RSA assumption (links | edit)
- ICE (cipher) (links | edit)
- Fialka (links | edit)
- Decisional Diffie–Hellman assumption (links | edit)
- 5-UCO (links | edit)
- Trifid cipher (links | edit)
- Residual block termination (links | edit)
- M-325 (links | edit)
- Turing (cipher) (links | edit)
- Rail fence cipher (links | edit)
- Kryha (links | edit)
- FISH (cipher) (links | edit)
- Secure Remote Password protocol (links | edit)
- JADE (cipher machine) (links | edit)
- HX-63 (links | edit)
- Akelarre (cipher) (links | edit)
- HC-9 (links | edit)
- Four-square cipher (links | edit)
- Bacon's cipher (links | edit)
- Two-square cipher (links | edit)
- Encrypted key exchange (links | edit)
- MULTI-S01 (links | edit)
- MUGI (links | edit)
- CD-57 (links | edit)
- C-52 (cipher machine) (links | edit)
- Related-key attack (links | edit)
- RSA problem (links | edit)
- Secure voice (links | edit)
- Proof of work (links | edit)
- Cramer–Shoup cryptosystem (links | edit)
- PBKDF2 (links | edit)
- Optimal asymmetric encryption padding (links | edit)
- Reihenschieber (links | edit)
- MQV (links | edit)
- Pinwheel (cryptography) (links | edit)
- Fortuna (PRNG) (links | edit)
- KG-84 (links | edit)
- SHA-2 (links | edit)
- Controlled Cryptographic Item (links | edit)
- IEEE P1363 (links | edit)
- Solitaire (cipher) (links | edit)
- Slide attack (links | edit)
- BID 770 (links | edit)
- UMAC (cryptography) (links | edit)
- Poly1305 (links | edit)
- ElGamal signature scheme (links | edit)
- IDEA NXT (links | edit)
- Secure telephone (links | edit)
- E0 (cipher) (links | edit)
- Boomerang attack (links | edit)
- Password-authenticated key agreement (links | edit)
- NOEKEON (links | edit)
- SPEKE (links | edit)
- Ciphertext indistinguishability (links | edit)
- Strong cryptography (links | edit)
- OCB mode (links | edit)
- CCM mode (links | edit)
- Authenticated encryption (links | edit)
- CS-Cipher (links | edit)
- ESTREAM (links | edit)
- Hidden Field Equations (links | edit)
- Differential-linear attack (links | edit)
- Oakley protocol (links | edit)
- Rainbow table (links | edit)
- Goldwasser–Micali cryptosystem (links | edit)
- Hash list (links | edit)
- Merkle tree (links | edit)
- KY-58 (links | edit)
- Station-to-Station protocol (links | edit)
- VEST (links | edit)
- Trivium (cipher) (links | edit)
- MDC-2 (links | edit)
- Efficient Probabilistic Public-Key Encryption Scheme (links | edit)
- Salsa20 (links | edit)
- Grain (cipher) (links | edit)
- Lacida (links | edit)
- CBC-MAC (links | edit)
- Data Authentication Algorithm (links | edit)
- Key whitening (links | edit)
- Cryptomeria cipher (links | edit)
- GOST (hash function) (links | edit)
- Blum–Goldwasser cryptosystem (links | edit)
- Clock (cryptography) (links | edit)
- BID/60 (links | edit)
- C-36 (cipher machine) (links | edit)
- Lamport signature (links | edit)
- Combined Cipher Machine (links | edit)
- CrypTool (links | edit)
- Cipher disk (links | edit)
- Higher-order differential cryptanalysis (links | edit)
- Impossible differential cryptanalysis (links | edit)
- Interpolation attack (links | edit)
- Elliptic-curve Diffie–Hellman (links | edit)
- Rockex (links | edit)
- Noreen (links | edit)
- Anubis (cipher) (links | edit)
- Pseudorandom function family (links | edit)
- NTRUSign (links | edit)
- Integrated Encryption Scheme (links | edit)
- Tap code (links | edit)
- Mercury (cipher machine) (links | edit)
- KL-43 (links | edit)
- SIGCUM (links | edit)
- OMI cryptograph (links | edit)
- One-way compression function (links | edit)
- KY-68 (links | edit)
- Py (cipher) (links | edit)
- XTR (links | edit)
- LEVIATHAN (cipher) (links | edit)
- Merkle–Damgård construction (links | edit)
- SNOW (links | edit)
- Nihilist cipher (links | edit)
- Scream (cipher) (links | edit)
- Panama (cryptography) (links | edit)
- EAX mode (links | edit)
- Key stretching (links | edit)
- Beaufort cipher (links | edit)
- Correlation immunity (links | edit)
- STU-II (links | edit)
- KY-3 (links | edit)
- Rambutan (cryptography) (links | edit)
- Navajo I (links | edit)
- Reservehandverfahren (links | edit)
- SM4 (cipher) (links | edit)
- Wadsworth's cipher (links | edit)
- Dragon (cipher) (links | edit)
- HC-256 (links | edit)
- LEX (cipher) (links | edit)
- SOSEMANUK (links | edit)
- KL-51 (links | edit)
- STU-I (links | edit)
- Rabbit (cipher) (links | edit)
- Derived unique key per transaction (links | edit)
- Pseudorandom permutation (links | edit)
- Zendian problem (links | edit)
- Smithy code (links | edit)
- Cryptographic primitive (links | edit)
- Pre-shared key (links | edit)
- Hasty Pudding cipher (links | edit)
- Grille (cryptography) (links | edit)
- Galois/Counter Mode (links | edit)
- Benaloh cryptosystem (links | edit)
- Naccache–Stern cryptosystem (links | edit)
- Naccache–Stern knapsack cryptosystem (links | edit)
- Achterbahn (stream cipher) (links | edit)
- CryptMT (links | edit)
- DECIM (links | edit)
- DICING (links | edit)
- F-FCSR (links | edit)
- Hermes8 (links | edit)
- MOSQUITO (links | edit)
- NLS (cipher) (links | edit)
- Polar Bear (cipher) (links | edit)
- SFINKS (links | edit)
- WG (cipher) (links | edit)
- Frogbit (cipher) (links | edit)
- Mir-1 (links | edit)
- SSS (cipher) (links | edit)
- TRBDK3 YAEA (links | edit)
- CJCSG (links | edit)
- ABC (stream cipher) (links | edit)
- Damgård–Jurik cryptosystem (links | edit)
- Threshold cryptosystem (links | edit)
- Distributed key generation (links | edit)
- Shared secret (links | edit)
- Integral cryptanalysis (links | edit)
- CRYPTON (links | edit)
- CWC mode (links | edit)
- KeeLoq (links | edit)
- Cobra ciphers (links | edit)
- Okamoto–Uchiyama cryptosystem (links | edit)
- PKCS 11 (links | edit)
- MASH-1 (links | edit)
- MULTI2 (links | edit)
- Nimbus (cipher) (links | edit)
- Q (cipher) (links | edit)
- Mercy (cipher) (links | edit)
- Crab (cipher) (links | edit)
- Alberti cipher (links | edit)
- NUSH (links | edit)
- SC2000 (links | edit)
- Public key fingerprint (links | edit)
- DFC (cipher) (links | edit)
- MESH (cipher) (links | edit)
- BaseKing (links | edit)
- Grand Cru (cipher) (links | edit)
- Hierocrypt (links | edit)
- E2 (cipher) (links | edit)
- IEEE 802.1AE (links | edit)
- M6 (cipher) (links | edit)
- T-function (links | edit)
- BassOmatic (links | edit)
- RadioGatún (links | edit)
- SOBER (links | edit)
- PMAC (cryptography) (links | edit)
- Zodiac (cipher) (links | edit)
- FEA-M (links | edit)
- CIKS-1 (links | edit)
- UES (cipher) (links | edit)
- Intel Cascade Cipher (links | edit)
- ARIA (cipher) (links | edit)
- CIPHERUNICORN-E (links | edit)
- CIPHERUNICORN-A (links | edit)
- KN-Cipher (links | edit)
- Spectr-H64 (links | edit)
- Xmx (links | edit)
- Treyfer (links | edit)
- Ladder-DES (links | edit)
- COCONUT98 (links | edit)
- New Data Seal (links | edit)
- SXAL/MBAL (links | edit)
- Truncated differential cryptanalysis (links | edit)
- M8 (cipher) (links | edit)
- HAS-V (links | edit)
- LILI-128 (links | edit)
- Davies attack (links | edit)
- Implicit certificate (links | edit)
- CONDOR secure cell phone (links | edit)
- CLEFIA (links | edit)
- Differential equations of addition (links | edit)
- Keystream (links | edit)
- Fluhrer, Mantin and Shamir attack (links | edit)
- BID 150 (links | edit)
- XXTEA (links | edit)
- Distinguishing attack (links | edit)
- ORYX (links | edit)
- Dropbear (software) (links | edit)
- PKCS 12 (links | edit)
- Cryptology Research Society of India (links | edit)
- Neural cryptography (links | edit)
- Chaocipher (links | edit)
- Decision Linear assumption (links | edit)
- Alternating step generator (links | edit)
- Wireless Public Key Infrastructure (links | edit)
- Decorrelation theory (links | edit)
- ISO/IEC 18014 (links | edit)
- Joseph Finnegan (cryptographer) (links | edit)
- OpenPGP card (links | edit)
- Partitioning cryptanalysis (links | edit)
- MultiSwap (links | edit)
- BEAR and LION ciphers (links | edit)
- Transient-key cryptography (links | edit)
- CEILIDH (links | edit)
- Contact analysis (links | edit)
- Three-pass protocol (links | edit)
- Information Security Group (links | edit)
- Universal composability (links | edit)
- QUAD (cipher) (links | edit)
- Quantum digital signature (links | edit)
- Differential fault analysis (links | edit)
- Multivariate cryptography (links | edit)
- Crypto-1 (links | edit)
- PKCS 1 (links | edit)
- BLS digital signature (links | edit)
- Lattice-based cryptography (links | edit)
- FASCINATOR (links | edit)
- Cryptography (links | edit)
- ANDVT (links | edit)
- Cube attack (links | edit)
- BATCO (links | edit)
- MD6 (links | edit)
- Merkle signature scheme (links | edit)
- Correlation attack (links | edit)
- Permutation box (links | edit)
- Skein (hash function) (links | edit)
- Threefish (links | edit)
- NIST hash function competition (links | edit)
- Fugue (hash function) (links | edit)
- CubeHash (links | edit)
- SHA-3 (links | edit)
- Grøstl (links | edit)
- Lane (hash function) (links | edit)
- JH (hash function) (links | edit)
- SANDstorm hash (links | edit)
- Comparison of cryptographic hash functions (links | edit)
- Niederreiter cryptosystem (links | edit)
- Bcrypt (links | edit)
- Type A Cipher Machine (links | edit)
- Spectral Hash (links | edit)
- AES implementations (links | edit)
- Averaging argument (links | edit)
- Identity-based cryptography (links | edit)
- Sub-group hiding (links | edit)
- Group-based cryptography (links | edit)
- Feedback with Carry Shift Registers (links | edit)
- Very smooth hash (links | edit)
- SMASH (hash) (links | edit)
- FIPS 140-3 (links | edit)
- Fast syndrome-based hash (links | edit)
- Security of cryptographic hash functions (links | edit)
- Elliptic curve only hash (links | edit)
- Export of cryptography (links | edit)
- Rotational cryptanalysis (links | edit)
- Twofish (links | edit)
- VMAC (links | edit)
- Hash function security summary (links | edit)
- IAPM (mode) (links | edit)
- Cipher security summary (links | edit)
- Proactive secret sharing (links | edit)
- NaSHA (links | edit)
- Schmidt-Samoa cryptosystem (links | edit)
- Solomon Kullback (links | edit)
- Codebook (links | edit)
- ADFGVX cipher (links | edit)
- Polybius square (links | edit)
- Magic (cryptography) (links | edit)
- Key exchange (links | edit)