ESTREAM
Project to identify new stream ciphers for widespread adoption
technology/cryptography
High-bandwidth Digital Content Protection
Digital copy protection
technology/cryptography
IEEE 802.11i-2004
IEEE standard version
technology/cryptography
RC4
Stream cipher
technology/cryptography
Signcryption
Asymmetric cryptographic primitive
technology/cryptography
X.509
Standard defining the format of public key certificates
technology/cryptography
Cryptographically secure pseudorandom number generator
Type of functions designed for being unsolvable by root-finding algorithms
technology/cryptography
Zero-knowledge proof
Proving validity without revealing other data
technology/cryptography
Twists of elliptic curves
Mathematical curves that are isomorphic over algebraic closures
technology/cryptography
3-Way
Block cipher
technology/cryptography
A5/2
Stream cipher
technology/cryptography
Anshel–Anshel–Goldfeld key exchange
Nonabelian cryptographic protocol
technology/cryptography
BaseKing
Block cipher
technology/cryptography
Autograph book
Album for collecting autographs
technology/cryptography
C2Net
Internet cryptography company
technology/cryptography
CAcert.org
Certificate authority
technology/cryptography
CAVE-based authentication
Authentification protocol
technology/cryptography
Cayley–Purser algorithm
1999 public-key cryptography algorithm
technology/cryptography
Byzantine fault
Fault in a computer system that presents different symptoms to different observers
technology/cryptography
Broadcast encryption
Encryption methods for TV programs
technology/cryptography
Bus encryption
Hardware communication security method
technology/cryptography
Chaffing and winnowing
Cryptographic technique
technology/cryptography
Certificateless cryptography
Variant of ID-based cryptography
technology/cryptography
Certificate Management Protocol
Cryptographic Internet protocol
technology/cryptography
Certification path validation algorithm
Test for a valid public key certificate
technology/cryptography
Certificate revocation list
List of revoked digital certificates
technology/cryptography
Churning (cipher)
technology/cryptography
COCONUT98
Block cipher
technology/cryptography
Clipper chip
Encryption device promoted by the NSA in the 1990s
technology/cryptography
Code Access Security
technology/cryptography
Cobra ciphers
Cryptographic cipher
technology/cryptography
Cipher
Algorithm for encrypting and decrypting information
technology/cryptography
Claw-free permutation
technology/cryptography
Cipher security summary
Attacks against common ciphers
technology/cryptography
Code-O-Graph
technology/cryptography
Chaos communications
technology/cryptography
Ciphertext stealing
Cryptographic algorithm
technology/cryptography
Codebook
Book for ciphers
technology/cryptography
Commitment scheme
Cryptographic scheme
technology/cryptography
Common Scrambling Algorithm
Encryption algorithm used by DVB television standard
technology/cryptography
Collision attack
Cryptographic attack
technology/cryptography
CryptoParty
Grassroots-sponsored public workshops to introduce basics of practical cryptography
technology/cryptography
CrySyS Lab
technology/cryptography
Cryptology Research Society of India
Indian organisation supporting cryptography research
technology/cryptography
CRYPTREC
Japanese cryptography research project
technology/cryptography
Cryptomathic
Cryptography company
technology/cryptography
Key-agreement protocol
Protocol for agreeing on a cryptographic key
technology/cryptography