Articles related to cryptography include: A5/1 • A5/2 • ABA digital signature guidelines • ABC (stream cipher) • Abraham Sinkov • Acoustic cryptanalysis...
BLS digital signature, also known as Boneh–Lynn–Shacham (BLS), is a cryptographic signature scheme which allows a user to verify that a signer is authentic...
efficient method is known for computing them in general. In cryptography, the computational complexity of the discrete logarithm problem and its application,...
{\displaystyle \mathbb {R} } . In computational complexity theory and cryptography, an index set is a set for which there exists an algorithm I that can sample...
overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects...
A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle n}...
that secrecy is of the essence in sending confidential messages – see Kerckhoffs' principle. In contrast, the revolutions in cryptography and secure communications...
of mathematical topics in quantum theory List of mathematical topics in relativity List of string theory topics Indexof wave articles The fields of mathematics...
In cryptography, a classical cipher is a type of cipher that was used historically but for the most part, has fallen into disuse. In contrast to modern...
Motor, a type of electric motor that uses permanent magnets in addition to windings on its field, rather than windings only. PMAC (cryptography), a message...
classical channel. E91 protocol (1991) is a quantum cryptography method that uses entangled pairs of photons to generate keys for secure communication,...
Elizabeth I. Greek Magical Papyri History ofcryptography Indice de Libros Prohibidos (1877) [Indexof Prohibited Books of Pope Pius IX (1877)] (in Spanish)....
In cryptography, a transposition cipher (also known as a permutation cipher) is a method of encryption which scrambles the positions of characters (transposition)...
In cryptography, coincidence counting is the technique (invented by William F. Friedman) of putting two texts side-by-side and counting the number of times...
In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is...
The Journal of Cryptology (ISSN 0933-2790) is a scientific journal in the field of cryptology and cryptography. The journal is published quarterly by the...
sensing, and cryptography. The journal is abstracted and indexed in Current Contents/Physical Chemical and Earth Sciences, the Science Citation Index Expanded...
Ravnitzky submitted a Freedom of Information Act (FOIA) request for an indexofarticles published in their Cryptographic Quarterly journal. Three years...
vulnerability to brute-force attacks. PBKDF2 is part of RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, specifically PKCS #5 v2.0, also...
fragments of a grid. The example key shows one way the letters can be assigned to the grid. The Pigpen cipher offers little cryptographic security. It...
Hyperelliptic curve cryptography is similar to elliptic curve cryptography (ECC) insofar as the Jacobian of a hyperelliptic curve is an abelian group...
This list of military awards and decorations of World War II is an index to articles on notable military awards presented by the combatants during World...
This is an alphabetical indexofarticles related to curves used in mathematics. Acnode Algebraic curve Arc Asymptote Asymptotic curve Barbier's theorem...
In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide information security such as confidentiality or authenticity...
a literary device than anything significant cryptographically. Indexof coincidence Topics in cryptography Zipf's law A Void, a novel by Georges Perec...
In cryptography, RC4 (Rivest Cipher 4, also known as ARC4 or ARCFOUR, meaning Alleged RC4, see below) is a stream cipher. While it is remarkable for its...
A cypherpunk is any individual advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change...