Skip to content

technology/cryptography

Surf Wiki
ESTREAM

Project to identify new stream ciphers for widespread adoption

technology/cryptography
High-bandwidth Digital Content Protection

Digital copy protection

technology/cryptography
IEEE 802.11i-2004

IEEE standard version

technology/cryptography
RC4

Stream cipher

technology/cryptography
Signcryption

Asymmetric cryptographic primitive

technology/cryptography
X.509

Standard defining the format of public key certificates

technology/cryptography
Cryptographically secure pseudorandom number generator

Type of functions designed for being unsolvable by root-finding algorithms

technology/cryptography
Zero-knowledge proof

Proving validity without revealing other data

technology/cryptography
Twists of elliptic curves

Mathematical curves that are isomorphic over algebraic closures

technology/cryptography
3-Way

Block cipher

technology/cryptography
A5/2

Stream cipher

technology/cryptography
Anshel–Anshel–Goldfeld key exchange

Nonabelian cryptographic protocol

technology/cryptography
BaseKing

Block cipher

technology/cryptography
Autograph book

Album for collecting autographs

technology/cryptography
C2Net

Internet cryptography company

technology/cryptography
CAcert.org

Certificate authority

technology/cryptography
CAVE-based authentication

Authentification protocol

technology/cryptography
Card catalog (cryptology)
technology/cryptography
Cayley–Purser algorithm

1999 public-key cryptography algorithm

technology/cryptography
Burrows–Abadi–Needham logic
technology/cryptography
Byzantine fault

Fault in a computer system that presents different symptoms to different observers

technology/cryptography
Broadcast encryption

Encryption methods for TV programs

technology/cryptography
Bus encryption

Hardware communication security method

technology/cryptography
Chaffing and winnowing

Cryptographic technique

technology/cryptography
Certificateless cryptography

Variant of ID-based cryptography

technology/cryptography
Certificate Management Protocol

Cryptographic Internet protocol

technology/cryptography
Certification path validation algorithm

Test for a valid public key certificate

technology/cryptography
Certificate revocation list

List of revoked digital certificates

technology/cryptography
Churning (cipher)
technology/cryptography
COCONUT98

Block cipher

technology/cryptography
Clipper chip

Encryption device promoted by the NSA in the 1990s

technology/cryptography
Code Access Security
technology/cryptography
Cobra ciphers

Cryptographic cipher

technology/cryptography
Cipher

Algorithm for encrypting and decrypting information

technology/cryptography
Claw-free permutation
technology/cryptography
Cipher security summary

Attacks against common ciphers

technology/cryptography
Code-O-Graph
technology/cryptography
Chaos communications
technology/cryptography
Ciphertext stealing

Cryptographic algorithm

technology/cryptography
Comparison of disk encryption software

None

technology/cryptography
Codebook

Book for ciphers

technology/cryptography
Commitment scheme

Cryptographic scheme

technology/cryptography
Common Scrambling Algorithm

Encryption algorithm used by DVB television standard

technology/cryptography
Collision attack

Cryptographic attack

technology/cryptography
CryptoParty

Grassroots-sponsored public workshops to introduce basics of practical cryptography

technology/cryptography
CrySyS Lab
technology/cryptography
Cryptology Research Society of India

Indian organisation supporting cryptography research

technology/cryptography
CRYPTREC

Japanese cryptography research project

technology/cryptography
Cryptomathic

Cryptography company

technology/cryptography
Key-agreement protocol

Protocol for agreeing on a cryptographic key

technology/cryptography